nttcom / metemcyberLinks
Decentralized Cyber Threat Intelligence Kaizen Framework
☆26Updated 3 years ago
Alternatives and similar repositories for metemcyber
Users that are interested in metemcyber are comparing it to the libraries listed below
Sorting:
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 2 years ago
- Automatically update IoC for lucky visitor scam☆26Updated 3 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆55Updated 3 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- R-CSIRT Linux Triage tool☆39Updated 7 years ago
- Open-source Fabric templates for cybersecurity and compliance☆21Updated 6 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- Ghidra Script for automated analysis of EMOTET☆17Updated 4 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆64Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated 2 weeks ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆49Updated 2 years ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 2 years ago
- A CALDERA plugin☆26Updated 11 months ago
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆29Updated last year
- Setting up a training environment for MISP☆12Updated 2 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Updated last year
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆24Updated last week
- A DFIR tool to collect artifacts on macOS☆55Updated 5 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆33Updated last year
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆152Updated 2 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 3 years ago
- Yet Another Memory Analyzer for malware detection☆186Updated 3 months ago
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆52Updated 2 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆71Updated 3 weeks ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆31Updated 2 years ago