target / attack-navigator-dockerLinks
A simple Docker container that serves the MITRE ATT&CK Navigator web app
☆27Updated 2 years ago
Alternatives and similar repositories for attack-navigator-docker
Users that are interested in attack-navigator-docker are comparing it to the libraries listed below
Sorting:
- pollen - A command-line tool for interacting with TheHive☆36Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆21Updated 7 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- ☆13Updated 6 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- ☆34Updated 4 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- automate your MISP installs☆68Updated 5 years ago
- misp-cloud - Cloud-ready images of MISP☆74Updated 3 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Recon Hunt Queries☆79Updated 4 years ago
- SEC599 supporting GitHub repository☆16Updated 6 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆31Updated 5 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- Deploy MISP Project software with Vagrant.☆45Updated 5 years ago
- ☆30Updated 6 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆16Updated 9 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆79Updated 3 years ago
- pocket guide for core threat hunting concepts☆23Updated 5 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆100Updated 5 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆93Updated 3 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 9 years ago
- ☆53Updated 7 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated last month
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago