rapid7 / dataLinks
☆46Updated last year
Alternatives and similar repositories for data
Users that are interested in data are comparing it to the libraries listed below
Sorting:
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 4 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Deploy MISP Project software with Vagrant.☆44Updated 5 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 4 years ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 5 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- ☆14Updated 7 years ago
- This is a python version of samesame repo to generate homograph strings☆23Updated 7 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 8 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Repository of Cofense Coronavirus Phishing Yara Rules (details can be found here: https://cofense.com/solutions/topic/coronavirus-infocen…☆10Updated 5 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 10 months ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- ☆20Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 3 years ago
- THOR MITRE ATT&CK Framework Coverage☆25Updated 5 years ago
- CVE.ICU code.☆46Updated this week
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- A CLI tool for querying passive DNS services☆41Updated last year