nttcom / metemcyberLinks
Decentralized Cyber Threat Intelligence Kaizen Framework
☆26Updated 3 years ago
Alternatives and similar repositories for metemcyber
Users that are interested in metemcyber are comparing it to the libraries listed below
Sorting:
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 2 years ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆21Updated this week
- CDIR Analyzer - parsers for data collected by CDIR Collector☆18Updated 2 years ago
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆152Updated 2 years ago
- Ghidra Script for automated analysis of EMOTET☆17Updated 4 years ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆44Updated 2 years ago
- Automatically update IoC for lucky visitor scam☆26Updated 2 months ago
- Prompt Hardener is an open-source tool that evaluates and strengthens system prompts used in LLM-based applications.☆18Updated this week
- Core A2P2V functionality (command line based)☆68Updated last year
- ☆16Updated last month
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆49Updated 2 years ago
- A DFIR tool to analyze artifacts on macOS☆33Updated 4 years ago
- A place to systematically store software bill of materials (SBOM) documents.☆46Updated 2 years ago
- Setting up a training environment for MISP☆12Updated 2 years ago
- R-CSIRT Linux Triage tool☆39Updated 6 years ago
- 脆弱性トリアージガイドライン作成の手引き☆27Updated 5 months ago
- RISKEN is a monitoring tool for visualizing security risks.☆22Updated last week
- ☆34Updated 4 years ago
- ☆62Updated last year
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 8 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆24Updated this week
- Trivy based vulnerability management service☆55Updated 3 months ago
- Open-source Fabric templates for cybersecurity and compliance☆20Updated 5 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated this week
- TypeScript Scenario-Based Web Application Fuzzing Framework☆65Updated 3 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated 3 weeks ago
- This repository contains generated contextual data utilized by pyattck.☆19Updated 3 months ago
- ☆11Updated 4 years ago
- Yet Another Memory Analyzer for malware detection☆183Updated 2 months ago