qeeqbox / mitre-visualizerLinks
𧬠Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
β94Updated 3 years ago
Alternatives and similar repositories for mitre-visualizer
Users that are interested in mitre-visualizer are comparing it to the libraries listed below
Sorting:
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacksβ182Updated 2 years ago
- Recent cyber attacks reports & interesting analysis filesβ15Updated 3 years ago
- Custom security distro for remote penetration testingβ53Updated 4 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOSβ¦β287Updated last year
- Cyber Threat Intelligence Data, Indicators, and Analysisβ87Updated 5 months ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviorsβ71Updated last year
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)β189Updated last year
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)β46Updated 4 years ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-techβ¦β54Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agenciesβ86Updated 3 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.β55Updated 11 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry Nβ¦β34Updated last month
- The Threat Actor Profile Guide for CTI Analystsβ107Updated last year
- Yara scan Phishing Kit's Zip archive(s)β59Updated last year
- Dictionary of CTI-related acronyms, terms, and jargonβ142Updated last year
- Source code used at TweetFeed.liveβ42Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.β114Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.β32Updated 5 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reportsβ73Updated 6 months ago
- Threat Detection & Anomaly Detection rules for popular open-source componentsβ52Updated 2 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threatsβ165Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data wβ¦β146Updated last year
- Practice CTI Quizβ13Updated last year
- Sniffing out well-known threat groupsβ28Updated 9 months ago
- β48Updated 3 weeks ago
- Library of threat hunts to get any user started!β44Updated 4 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.β35Updated 2 years ago
- URL fingerprinting made easyβ86Updated last year
- BlackBerry Threat Research & Intelligenceβ98Updated last year
- A collection of tips for using MISP.β74Updated 5 months ago