vz-risk / flow
Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)
☆44Updated 2 years ago
Alternatives and similar repositories for flow:
Users that are interested in flow are comparing it to the libraries listed below
- CSIRT Jump Bag☆26Updated last year
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆27Updated 5 months ago
- ☆15Updated 4 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆16Updated 4 years ago
- pocket guide for core threat hunting concepts☆23Updated 5 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆24Updated 5 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- A script to create and assign SOP tasks into the cases☆19Updated 4 years ago
- MITRE Shield website☆19Updated 3 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆22Updated 3 years ago
- Recon Hunt Queries☆77Updated 3 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- Site for IWS book content☆18Updated 6 years ago
- ☆29Updated 4 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Open-source Fabric templates for cybersecurity and compliance☆17Updated 3 months ago
- Jupyter notebooks☆25Updated 4 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- Threat Box Assessment Tool☆19Updated 3 years ago
- Intrusion Detection Honeypots Book Code☆25Updated 4 years ago
- incident response scripts☆19Updated 6 years ago
- ☆58Updated 2 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- ☆18Updated 3 years ago
- ☆34Updated 6 months ago
- My Jupyter Notebooks☆36Updated last month
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 3 months ago