stratosphereips / stratocyberlabLinks
Stratosphere Cyber Range to learn cybersecurity attacking and defending techniques locally in your computer
☆68Updated 4 months ago
Alternatives and similar repositories for stratocyberlab
Users that are interested in stratocyberlab are comparing it to the libraries listed below
Sorting:
- MISP Playbooks☆202Updated 4 months ago
- Knowledge base on cybercriminal concealment techniques☆70Updated last month
- Building a consolidated RSS feed for articles about cyberattacks☆67Updated this week
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆158Updated this week
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆94Updated 7 months ago
- ☆70Updated 2 months ago
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆13Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆88Updated last year
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆103Updated 9 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 5 months ago
- ☆104Updated 2 weeks ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆251Updated 2 weeks ago
- List of past and future infosec related events.☆154Updated last week
- Signature based honeypot detector tool written in Golang☆95Updated 2 months ago
- ☆180Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆76Updated 2 weeks ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆38Updated this week
- A collection of methods to learn who the owner of an IP address is.☆159Updated last week
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆254Updated 2 months ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆127Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- 🏴☠️💰 Another Ransomware gang tracker☆209Updated this week
- Harness the power of Splunk for your investigations☆108Updated last week
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆24Updated 5 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 7 months ago
- ☆92Updated 3 weeks ago
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆168Updated 2 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆97Updated last week
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year