wavestone-cdt / 1-2-3-CyberLinks
☆18Updated 5 years ago
Alternatives and similar repositories for 1-2-3-Cyber
Users that are interested in 1-2-3-Cyber are comparing it to the libraries listed below
Sorting:
- ☆25Updated 4 years ago
- ☆23Updated last year
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Updated 3 years ago
- Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.☆41Updated 9 months ago
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆71Updated 8 months ago
- Automated handling of data feeds for security teams☆144Updated 2 months ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆62Updated 4 years ago
- AttackMatrix is a Python module and/or webpage to interact with and explore MITRE's ATT&CK's matrices.☆17Updated 2 years ago
- Dashboards for conducting forensic investigation using windows events in Kibana☆18Updated 6 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- Outlook add-in companion to report suspicious mail easily☆133Updated 3 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 7 months ago
- Data related to the SANS Internet Storm Center☆13Updated 3 months ago
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆148Updated 10 months ago
- Automatically exported from code.google.com/p/nipper-ng☆72Updated 3 years ago
- Rapports techniques de VIGINUM☆36Updated 2 months ago
- ☆36Updated last year
- Sys Mon! Why yu nuh logging dat?☆12Updated 7 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆64Updated 5 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 5 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆33Updated 2 years ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆165Updated this week
- ☆41Updated 3 years ago
- Defensomania is a security monitoring and incident response card game.☆63Updated 2 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆25Updated 6 years ago
- XOR Key Extractor☆51Updated last year
- My Jupyter Notebooks☆36Updated 8 months ago
- ☆23Updated 5 years ago