nttcom / metemcyberLinks
Decentralized Cyber Threat Intelligence Kaizen Framework
☆26Updated 3 years ago
Alternatives and similar repositories for metemcyber
Users that are interested in metemcyber are comparing it to the libraries listed below
Sorting:
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 2 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆35Updated last week
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆22Updated 2 weeks ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆57Updated 5 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- Automatically update IoC for lucky visitor scam☆26Updated 5 months ago
- Tools used by CSIRT and especially in the scope of CNW☆17Updated 2 months ago
- Ghidra Script for automated analysis of EMOTET☆17Updated 4 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆79Updated 2 weeks ago
- R-CSIRT Linux Triage tool☆39Updated 7 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 5 months ago
- Firepit - STIX Columnar Storage☆16Updated last year
- Automatic detection engineering technical state compliance☆55Updated last year
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Open-source Fabric templates for cybersecurity and compliance☆21Updated 8 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆66Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆32Updated 2 years ago
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆30Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- CDIR Analyzer - parsers for data collected by CDIR Collector☆18Updated 2 years ago
- Workflows for Shuffle☆23Updated 2 years ago
- Repository resource threat intelligence for SOC☆10Updated 7 years ago
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆50Updated 2 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated last month
- Memory Forensic System on Cloud☆91Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆82Updated 3 weeks ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 3 years ago