rapid7 / dataLinks
☆46Updated last year
Alternatives and similar repositories for data
Users that are interested in data are comparing it to the libraries listed below
Sorting:
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 4 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 8 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Threat Mapping Catalogue☆17Updated 4 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 4 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 5 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated 2 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Deploy MISP Project software with Vagrant.☆44Updated 5 years ago
- ☆14Updated 7 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- ⚔️MITRE ATT&CK Machinations in R☆23Updated 5 years ago
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Updated 7 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Updated 5 years ago
- ☆30Updated 6 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- Home to the ActorTrackr source code☆29Updated 8 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆42Updated 4 years ago
- Site for IWS book content☆17Updated 6 years ago
- A list of IOCs applicable to PoshC2☆24Updated 5 years ago
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Updated 7 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 7 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 8 years ago