stratosphereips / stratocyberlab
Stratosphere Cyber Range to learn cybersecurity attacking and defending techniques locally in your computer
☆66Updated 2 months ago
Alternatives and similar repositories for stratocyberlab:
Users that are interested in stratocyberlab are comparing it to the libraries listed below
- Building a consolidated RSS feed for articles about cyberattacks☆67Updated this week
- List of past and future infosec related events.☆144Updated this week
- MISP Playbooks☆197Updated 2 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆87Updated 5 months ago
- A tool for mapping cyber crime☆136Updated last week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆149Updated 7 months ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆127Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆239Updated last month
- ☆137Updated last month
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆83Updated last year
- ☆173Updated last year
- Creation of a laboratory for malware analysis in AWS☆95Updated 2 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆196Updated 9 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 6 months ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆195Updated 2 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆237Updated last month
- A repository of credential stealer formats☆210Updated 3 weeks ago
- Repository of tools and resources for analyzing Docker containers☆65Updated last year
- ☆102Updated 2 weeks ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- ☆87Updated 2 months ago
- AI-Powered Dark Web OSINT Tool☆36Updated this week
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆150Updated 2 months ago
- Harness the power of Splunk for your investigations☆99Updated 3 weeks ago
- Repository resource for threat hunter☆158Updated 6 years ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Updated 5 months ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆101Updated 8 months ago
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆90Updated 2 weeks ago