nttcom / metemcyberLinks
Decentralized Cyber Threat Intelligence Kaizen Framework
☆27Updated 3 years ago
Alternatives and similar repositories for metemcyber
Users that are interested in metemcyber are comparing it to the libraries listed below
Sorting:
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 3 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Updated 9 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- Automatically update IoC for lucky visitor scam☆26Updated 9 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆37Updated last month
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆23Updated 3 weeks ago
- Tools used by CSIRT and especially in the scope of CNW☆17Updated 6 months ago
- R-CSIRT Linux Triage tool☆39Updated 7 years ago
- Workflows for Shuffle☆24Updated 3 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆41Updated 8 months ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated 2 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆52Updated this week
- Ghidra Script for automated analysis of EMOTET☆17Updated 4 years ago
- ☆20Updated last month
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Updated 3 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Updated 2 months ago
- ☆44Updated 5 months ago
- Automatic detection engineering technical state compliance☆55Updated last year
- ☆23Updated last year
- The Intelligent Process Lifecycle of Active Cyber Defenders☆33Updated 3 years ago
- Open-source Fabric templates for cybersecurity and compliance☆28Updated 11 months ago
- Adversary Emulation Planner☆42Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆88Updated this week
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆51Updated 2 years ago
- Memory Forensic System on Cloud☆92Updated 2 years ago
- Firepit - STIX Columnar Storage☆17Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago