opencybersecurityalliance / kestrel-jupyter
Kestrel Jupyter Notebook Kernel
☆9Updated last year
Alternatives and similar repositories for kestrel-jupyter:
Users that are interested in kestrel-jupyter are comparing it to the libraries listed below
- Firepit - STIX Columnar Storage☆16Updated 9 months ago
- Posture Attribute Collection and Evaluation☆24Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 4 years ago
- List of sigma for a variety of threats for multiple log sources.☆11Updated 6 years ago
- ☆18Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 4 months ago
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆32Updated last year
- Build Automated Machine Images for MISP☆28Updated last year
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated 4 months ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 4 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Workflows for Shuffle☆21Updated 2 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆16Updated 4 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆62Updated 11 months ago
- Automatic detection engineering technical state compliance☆54Updated 8 months ago
- Best practices in threat intelligence☆46Updated 2 years ago
- ☆33Updated 3 years ago
- A script to create and assign SOP tasks into the cases☆19Updated 4 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- Recon Hunt Queries☆76Updated 3 years ago
- ☆34Updated 4 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆48Updated last year
- Exports MISP events to STIX and ingest into McAfee ESM☆15Updated 5 years ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆18Updated 2 weeks ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆31Updated 11 months ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated last year