Synthetic Adversarial Log Objects: A Framework for synthentic log generation
☆86Jan 11, 2024Updated 2 years ago
Alternatives and similar repositories for salo
Users that are interested in salo are comparing it to the libraries listed below
Sorting:
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆69Mar 17, 2024Updated last year
- WordPress version identification and vulnerability finder.☆31Oct 4, 2022Updated 3 years ago
- GoldenSAML Attack Libraries and Framework☆77Jun 5, 2024Updated last year
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- External twitter feeder for AIL framework☆16Apr 16, 2023Updated 2 years ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- ☆118Jun 2, 2021Updated 4 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,445Updated this week
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Dec 29, 2025Updated 2 months ago
- An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, fo…☆13Aug 19, 2022Updated 3 years ago
- Tools used by CSIRT and especially in the scope of CNW☆18Updated this week
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆111Mar 25, 2021Updated 4 years ago
- OASIS TC Open Repository: STIX Enhancement Proposals (SEPs) https://github.com/oasis-open/cti-sep-repository☆16Jun 15, 2023Updated 2 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 3 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆57Feb 19, 2026Updated last week
- ☆30Mar 3, 2021Updated 4 years ago
- Spam trap management☆23Jun 18, 2024Updated last year
- A Python library to help with some common threat hunting data analysis operations☆142Apr 23, 2023Updated 2 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆50Aug 30, 2025Updated 6 months ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Jan 31, 2025Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Apr 15, 2024Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Apr 15, 2024Updated last year
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Open Source Threat Intelligence Platform☆164Jan 8, 2026Updated last month
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 3 years ago
- OSSEM Detection Model☆183Oct 11, 2022Updated 3 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Jul 10, 2025Updated 7 months ago
- CASCADE Server☆274Dec 8, 2022Updated 3 years ago
- Security Monitoring Resolution Categories☆138Nov 25, 2021Updated 4 years ago