rapid7 / data
☆45Updated last year
Related projects ⓘ
Alternatives and complementary repositories for data
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆43Updated 2 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 3 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 5 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- Generate bulk YARA rules from YAML input☆22Updated 4 years ago
- CARET - A tool for viewing cyber analytic relationships☆53Updated 4 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Updated last year
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 4 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆22Updated 3 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆77Updated 6 months ago
- ☆28Updated 7 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆92Updated 4 years ago
- IoC's, PCRE's, YARA's etc☆20Updated last week
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Updated 6 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆23Updated 5 years ago
- Public repository for Red Canary Research☆34Updated 4 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- Parsing MITRE EDR Evaluation results☆12Updated 5 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Cybersecurity Incidents Mind Maps☆32Updated 3 years ago
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆32Updated this week
- Miscellaneous scripts for analyzing protocols and systems☆13Updated 8 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 5 years ago
- A curated threat modeling library collection☆21Updated 11 months ago