All Projects → cycat-service → Similar Projects or Alternatives

430 Open source projects that are alternatives of or similar to cycat-service

connectors
OpenCTI connectors
Stars: ✭ 135 (+440%)
Misp
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+13840%)
Mutual labels:  cybersecurity, misp, cti, threat-intelligence
attckr
⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (-12%)
attack-evals
ATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (+128%)
Mutual labels:  cybersecurity, cti, mitre-attack
YAFRA
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-12%)
client-python
OpenCTI Python Client
Stars: ✭ 45 (+80%)
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+2604%)
mitreattack-python
A python module for working with ATT&CK
Stars: ✭ 208 (+732%)
Mutual labels:  cybersecurity, cti, mitre-attack
Opencti
Authors
Stars: ✭ 2,165 (+8560%)
Spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+27428%)
mitrecnd.github.io
MITRE Shield website
Stars: ✭ 17 (-32%)
Mutual labels:  cybersecurity, cti, mitre-attack
intelligence-icons
intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; including but not limited to CTI, MISP Threat Sharing, STIX 2.
Stars: ✭ 32 (+28%)
Mutual labels:  misp, threat-intelligence
Attack Navigator
Web app that provides basic navigation and annotation of ATT&CK matrices
Stars: ✭ 887 (+3448%)
Mutual labels:  cybersecurity, mitre-attack
attack to veris
The principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Stars: ✭ 56 (+124%)
Mutual labels:  cybersecurity, mitre-attack
attack-stix-data
STIX data representing MITRE ATT&CK
Stars: ✭ 118 (+372%)
Mutual labels:  cybersecurity, cti
Elemental
Elemental - An ATT&CK Threat Library
Stars: ✭ 241 (+864%)
Misp Maltego
Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Stars: ✭ 112 (+348%)
misp-takedown
A curses-style interface for automatic takedown notification based on MISP events.
Stars: ✭ 19 (-24%)
Mutual labels:  misp, threat-intelligence
SyntheticSun
SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, managed AWS security services and, serverless technologies to continuously prevent, detect and respond to threats.
Stars: ✭ 49 (+96%)
Mutual labels:  misp, threat-intelligence
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (+180%)
rstthreats
Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
Stars: ✭ 17 (-32%)
Adversary emulation library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Stars: ✭ 295 (+1080%)
Mutual labels:  cybersecurity, mitre-attack
best-practices-in-threat-intelligence
Best practices in threat intelligence
Stars: ✭ 38 (+52%)
Mutual labels:  misp, threat-intelligence
Open-source-tools-for-CTI
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (+264%)
Mutual labels:  cybersecurity, cti
Watcher
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (+1196%)
Shuffle
Shuffle: A general purpose security automation platform platform. We focus on accessibility for all.
Stars: ✭ 424 (+1596%)
Mutual labels:  cybersecurity, mitre-attack
Patrowlhears
PatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (+256%)
Analyst Arsenal
A toolkit for Security Researchers
Stars: ✭ 112 (+348%)
Chatter
internet monitoring osint telegram bot for windows
Stars: ✭ 123 (+392%)
Osweep
Don't Just Search OSINT. Sweep It.
Stars: ✭ 225 (+800%)
nsm-attack
Mapping NSM rules to MITRE ATT&CK
Stars: ✭ 53 (+112%)
Caldera
Automated Adversary Emulation Platform
Stars: ✭ 3,126 (+12404%)
Mutual labels:  cybersecurity, mitre-attack
Besafe
BeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-16%)
Misp Dashboard
A dashboard for a real-time overview of threat intelligence from MISP instances
Stars: ✭ 142 (+468%)
Attack Website
MITRE ATT&CK Website
Stars: ✭ 231 (+824%)
Mutual labels:  cybersecurity, mitre-attack
mail to misp
Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.
Stars: ✭ 61 (+144%)
Mutual labels:  misp, threat-intelligence
misp-osint-collection
Collection of best practices to add OSINT into MISP and/or MISP communities
Stars: ✭ 54 (+116%)
Mutual labels:  misp, threat-intelligence
Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (+756%)
Attack Scripts
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Stars: ✭ 290 (+1060%)
Mutual labels:  cybersecurity, mitre-attack
docker-misp
A (nearly) production ready Dockered MISP
Stars: ✭ 184 (+636%)
Mutual labels:  misp, threat-intelligence
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+216%)
Attack Control Framework Mappings
Security control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Stars: ✭ 115 (+360%)
Mutual labels:  cybersecurity, mitre-attack
Ioc Explorer
Explore Indicators of Compromise Automatically
Stars: ✭ 73 (+192%)
Malware Feed
Bringing you the best of the worst files on the Internet.
Stars: ✭ 69 (+176%)
Sentinel Attack
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (+2604%)
Mutual labels:  cybersecurity, mitre-attack
Abused-Legitimate-Services
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Stars: ✭ 42 (+68%)
Mutual labels:  cybersecurity, cti
censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (+16%)
AutonomousThreatSweep
Threat Hunting queries for various attacks
Stars: ✭ 70 (+180%)
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (+80%)
Mutual labels:  cybersecurity
gsvsoc cirt-playbook-battle-cards
Cyber Incident Response Team Playbook Battle Cards
Stars: ✭ 142 (+468%)
Mutual labels:  cybersecurity
digital-copyright
Stamp your code with a trackable digital copyright
Stars: ✭ 17 (-32%)
Mutual labels:  cybersecurity
HostEnumerator
A tool that automates the process of enumeration
Stars: ✭ 29 (+16%)
Mutual labels:  cybersecurity
echoCTF.RED
A platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase
Stars: ✭ 33 (+32%)
Mutual labels:  cybersecurity
coronavirus-covid-19-SARS-CoV-2-IoCs
All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns
Stars: ✭ 67 (+168%)
Mutual labels:  threat-intelligence
Malicious-Urlv5
A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (+40%)
Mutual labels:  cybersecurity
haiti
🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+1048%)
Mutual labels:  cybersecurity
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+236%)
Mutual labels:  cybersecurity
robot hacking manual
Robot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.
Stars: ✭ 169 (+576%)
Mutual labels:  cybersecurity
misp-vagrant
Deploy MISP Project software with Vagrant.
Stars: ✭ 37 (+48%)
Mutual labels:  misp
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+248%)
Mutual labels:  cybersecurity
1-60 of 430 similar projects