Decentralized Cyber Threat Intelligence Kaizen Framework
☆27Jan 31, 2022Updated 4 years ago
Alternatives and similar repositories for metemcyber
Users that are interested in metemcyber are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆25Mar 9, 2026Updated 2 weeks ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- This is the OpenChain Telco Work Group☆20Mar 18, 2026Updated last week
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- TOPPERS/ASP3 Kernel written in Zig Programming Language☆16Jul 24, 2024Updated last year
- Linux agent used to submit realtime SBOMs and dependency usage information to EdgeBit☆15Jan 24, 2025Updated last year
- makecfg is a tool for making CFG(Control Flow Graph) from binary.☆18Jan 11, 2022Updated 4 years ago
- CVEs <--> Metasploit-Framework modules☆25Mar 9, 2026Updated 2 weeks ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Sep 14, 2023Updated 2 years ago
- ☆10Sep 2, 2023Updated 2 years ago
- Helm Chart for deploying GUAC☆18Mar 9, 2026Updated 2 weeks ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- List of SBOM Generation Tools☆30Mar 7, 2025Updated last year
- 書籍『AIセキュリティから学ぶ ディープラーニング[技術]入門]』(技術評論者発行)で利用するソースコードを掲載しています(公式)。☆13Dec 12, 2020Updated 5 years ago
- cross-architecture static library detector for IoT malware☆43Jan 7, 2026Updated 2 months ago
- Cyber Threat Intelligence Feeds☆98Sep 26, 2016Updated 9 years ago
- GitHub action to produce a SBOM report from a given Black Duck project☆12Feb 5, 2026Updated last month
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆57Jan 16, 2023Updated 3 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- Create CycloneDX Software Bill of Materials (SBOM) for Buildroot projects☆15Dec 9, 2025Updated 3 months ago
- Gungnir - Homelab Automation Tool to Guard your very own Asgard☆16Jan 26, 2026Updated last month
- This is a fork of optimization part of RISO project (http://riso.sourceforge.net/)☆13Aug 30, 2015Updated 10 years ago
- This is a mapping of CPEs to package urls created by using VulnerableCode's data☆10Aug 14, 2020Updated 5 years ago
- OSS License Simple Viewer is a simple Excel-based tool as OSS license reference for engineers.☆14Nov 20, 2020Updated 5 years ago
- Parse and compare package versions and ranges. From debian, npm, pypi, ruby and more. Process all the version range specs and expressions…☆43Feb 25, 2026Updated last month
- .NET library to consume and produce CycloneDX Software Bill of Materials (SBOM)☆26Mar 17, 2026Updated last week
- ☆11Oct 11, 2020Updated 5 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- ☆38Apr 29, 2018Updated 7 years ago
- Android-specific Energy Smell Identification and Refactoring plugin for IntelliJ IDEA-based IDEs☆11Feb 29, 2020Updated 6 years ago
- License Identifier☆14Mar 25, 2021Updated 4 years ago
- Sharing Threat Hunting runbooks☆25Jul 5, 2019Updated 6 years ago
- Zeek-Formatted Threat Intelligence Feeds☆390Mar 18, 2026Updated last week
- ☆13May 17, 2020Updated 5 years ago
- Cybercrime forums for Cyber Threat Intelligence purpose☆92Sep 25, 2019Updated 6 years ago
- Summarize CTI reports with OpenAI☆18Mar 16, 2026Updated last week
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago