rapid7 / data
☆45Updated last year
Related projects ⓘ
Alternatives and complementary repositories for data
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆43Updated 2 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- ☆14Updated 6 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆13Updated 2 years ago
- For storing of the volumes☆3Updated 4 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆97Updated last year
- SwitHak' Security Place for my Opinions and Work☆34Updated last year
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 3 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 5 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Home to the ActorTrackr source code☆27Updated 7 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month
- ☆27Updated 2 weeks ago
- Cybersecurity Incidents Mind Maps☆32Updated 3 years ago
- CARET - A tool for viewing cyber analytic relationships☆53Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated 10 months ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆44Updated last year
- Indicator of Compromise Scanner for CVE-2019-19781☆92Updated 4 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆60Updated 7 months ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 3 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆22Updated 3 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 2 years ago
- A curated threat modeling library collection☆21Updated 11 months ago