rapid7 / dataLinks
☆47Updated 2 years ago
Alternatives and similar repositories for data
Users that are interested in data are comparing it to the libraries listed below
Sorting:
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 7 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 5 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Updated 7 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆107Updated this week
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 8 years ago
- A CVE Heatmap Using CalPlot☆97Updated 5 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 6 years ago
- DNS server limitation mapper☆26Updated 7 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month
- ATT&CK Evaluations website (DEPRECATED)☆62Updated 4 years ago
- Open source tools, libraries, and datasets related to the runZero product and associated research☆125Updated 2 weeks ago
- A framework to generate unique test cases based on code snippets to test techniques☆54Updated 4 years ago
- ☆14Updated 7 years ago
- Repository of Cofense Coronavirus Phishing Yara Rules (details can be found here: https://cofense.com/solutions/topic/coronavirus-infocen…☆10Updated 5 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 6 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 3 years ago
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Updated 7 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- Deploy MISP Project software with Vagrant.☆45Updated 5 years ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Updated 6 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Updated 4 years ago
- Python wrapper for the Mitre ATT&CK framework API☆30Updated 7 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆58Updated 5 years ago
- Security tools, scanners, exploit code☆31Updated 8 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 4 years ago