nttcom / metemcyber
Decentralized Cyber Threat Intelligence Kaizen Framework
☆23Updated 3 years ago
Alternatives and similar repositories for metemcyber:
Users that are interested in metemcyber are comparing it to the libraries listed below
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆18Updated this week
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆70Updated 2 years ago
- Trivy based vulnerability management service☆55Updated 2 months ago
- A place to systematically store software bill of materials (SBOM) documents.☆44Updated last year
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 2 years ago
- Automatically update IoC for lucky visitor scam☆26Updated this week
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆45Updated last year
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆23Updated 3 weeks ago
- 脆弱性トリアージガイドライン作成の手引き☆27Updated last month
- Ghidra Script for automated analysis of EMOTET☆17Updated 4 years ago
- EPSS(Exploit Prediction Scoring System) API client☆18Updated last week
- Prompt Hardener is a tool designed to evaluate and enhance the securify of system prompts for RAG systems.☆14Updated 2 months ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- TypeScript Scenario-Based Web Application Fuzzing Framework☆65Updated 2 years ago
- Core A2P2V functionality (command line based)☆67Updated 9 months ago
- RISKEN is a monitoring tool for visualizing security risks.☆21Updated this week
- CDIR Analyzer - parsers for data collected by CDIR Collector☆18Updated last year
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆151Updated 2 years ago
- ☆15Updated 2 weeks ago
- VulsRepo is visualized based on the json report output in vuls.☆34Updated 3 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆14Updated last week
- Simple SQL Injection Lab: Hands-on guide and Docker setup for exploring MySQL and PostgreSQL injection techniques☆30Updated last year
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆60Updated this week
- 高対話型ハニーポット☆27Updated 5 years ago
- CVSS v4.0 calculator☆29Updated 5 months ago
- R-CSIRT Linux Triage tool☆38Updated 6 years ago
- ☆34Updated 3 years ago
- A DFIR tool to collect artifacts on macOS☆54Updated 4 years ago
- ☆17Updated 3 months ago
- ☆59Updated 9 months ago