nttcom / metemcyberLinks
Decentralized Cyber Threat Intelligence Kaizen Framework
☆27Updated 3 years ago
Alternatives and similar repositories for metemcyber
Users that are interested in metemcyber are comparing it to the libraries listed below
Sorting:
- Lightweight Python-Based Malware Analysis Pipeline☆36Updated last month
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆22Updated last month
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 3 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆57Updated 6 months ago
- R-CSIRT Linux Triage tool☆39Updated 7 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 6 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆66Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆32Updated this week
- Adversary Emulation Planner☆42Updated last year
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated last year
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 3 years ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆83Updated last month
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- Ghidra Script for automated analysis of EMOTET☆17Updated 4 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆81Updated 3 weeks ago
- Automatically update IoC for lucky visitor scam☆26Updated 6 months ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆37Updated 4 months ago
- Augmentation to Machine Readable CTI☆34Updated last month
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 3 years ago
- A DFIR tool to analyze artifacts on macOS☆33Updated 4 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆33Updated 2 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆58Updated 3 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆34Updated 2 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Updated 3 years ago
- Memory Forensic System on Cloud☆91Updated last year
- Tools used by CSIRT and especially in the scope of CNW☆17Updated 3 months ago
- Stakeholder-Specific Vulnerability Categorization☆166Updated last week
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆18Updated 7 months ago
- Summarize CTI reports with OpenAI☆17Updated last week