prodaft / cradle
CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taking, automated data linking, interactive visualizations, and robust access control. Enhance your CTI workflow from analysis to reporting—all in one secure space.
☆157Updated this week
Alternatives and similar repositories for cradle:
Users that are interested in cradle are comparing it to the libraries listed below
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆101Updated 3 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆160Updated last month
- A repository of credential stealer formats☆202Updated this week
- Canary Detection☆164Updated 11 months ago
- God Mode Detection Rules☆134Updated 7 months ago
- Automation tool for Windows Deception Host Burn-In☆84Updated 3 months ago
- ☆126Updated 3 weeks ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆71Updated this week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆146Updated 6 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆138Updated 2 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆50Updated last year
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆223Updated this week
- ☆72Updated last week
- ☆87Updated last month
- Rules shared by the community from 100 Days of YARA 2025☆30Updated 2 months ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated 10 months ago
- Mapping of open-source detection rules and atomic tests.☆158Updated 2 months ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆167Updated last month
- Convert Sigma rules to SIEM queries, directly in your browser.☆59Updated this week
- Halberd : Multi-Cloud Attack Platform☆251Updated 3 weeks ago
- MISP Playbooks☆188Updated last month
- 🏴☠️💰 Another Ransomware gang tracker☆185Updated this week
- Generate datasets of cloud audit logs for common attacks☆208Updated 7 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 5 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆192Updated 2 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 2 months ago
- Protection against HTML smuggling attempts.☆93Updated last week
- Signature based honeypot detector tool written in Golang☆89Updated last week
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆66Updated 9 months ago