otoriocyber / chronosLinks
python framework to parse logs for IR
☆16Updated 4 years ago
Alternatives and similar repositories for chronos
Users that are interested in chronos are comparing it to the libraries listed below
Sorting:
- Falcon Integration Gateway (FIG)☆18Updated last month
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- Documentation used for Shuffle☆19Updated last week
- Scripts to inject demo data and network traffic into an existing Alienvault/OSSIM installation☆21Updated 7 years ago
- A platform built for easy-to-use automated network traffic analysis☆59Updated 2 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Posture Attribute Collection and Evaluation☆23Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆28Updated last year
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 10 months ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- OSSEM Common Data Model☆55Updated 2 years ago
- ☆19Updated 4 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated last month
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Firepit - STIX Columnar Storage☆16Updated last year
- Best practices in threat intelligence☆47Updated 2 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆16Updated 4 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 8 months ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆31Updated last year
- Build Automated Machine Images for MISP☆28Updated last year
- Workflows for Shuffle☆23Updated 2 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- ☆17Updated 3 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆10Updated last year
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆21Updated last week