vertexproject / synapse-quickstart
Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.
☆39Updated 2 years ago
Alternatives and similar repositories for synapse-quickstart:
Users that are interested in synapse-quickstart are comparing it to the libraries listed below
- Converting data from services like Censys and Shodan to a common data model☆49Updated 4 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆24Updated 3 weeks ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- List of Awesome Vertex Synapse Resources☆27Updated 5 months ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated last week
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated 2 months ago
- ☆24Updated 2 years ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- The core backend server handling API requests and task management☆34Updated last week
- ☆86Updated 5 months ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- Scripts and lists to help generate YARA friendly string mutations☆19Updated last year
- CSIRT Jump Bag☆27Updated 9 months ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆33Updated 2 years ago
- Can you pay the ransom in your country?☆13Updated last year
- ☆34Updated 4 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- ☆32Updated 3 months ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆27Updated 10 months ago
- A home for detection content developed by the delivr.to team☆64Updated last week
- Recon Hunt Queries☆76Updated 3 years ago
- A collection of tips for using MISP.☆74Updated last month
- Because phishtank was taken.. explore phishing kits in a contained environment!☆45Updated 2 years ago
- Cyber Threats Detection Rules☆14Updated 3 weeks ago
- Summarize CTI reports with OpenAI☆13Updated this week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆115Updated last year
- ☆48Updated 2 years ago