rapid7 / dataLinks
☆47Updated 2 years ago
Alternatives and similar repositories for data
Users that are interested in data are comparing it to the libraries listed below
Sorting:
- Bluehat 2018 Graphs for Security Workshop☆42Updated 7 years ago
- ATT&CK Evaluations website (DEPRECATED)☆62Updated 4 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 6 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆107Updated last month
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Updated 7 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 8 years ago
- Cybersecurity Incidents Mind Maps☆34Updated 4 years ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated 3 weeks ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Updated 2 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 5 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- Open source tools, libraries, and datasets related to the runZero product and associated research☆125Updated this week
- Home to the ActorTrackr source code☆30Updated 8 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 8 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated 2 years ago
- ☆14Updated 7 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆32Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 6 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- Public rules and samples for various automations through LimaCharlie.io☆14Updated 4 years ago
- A CVE Heatmap Using CalPlot☆97Updated 5 years ago
- THOR MITRE ATT&CK Framework Coverage☆25Updated 5 years ago