2*yo (2xyo)

2xyo

Geek Repo

Company:Personnal

Location:France

Github PK Tool:Github PK Tool


Organizations
imt-atlantique

2*yo's starred repositories

system-design-101

Explain complex systems using visuals and simple terms. Help you prepare for system design interviews.

localGPT

Chat with your documents on your local device using GPT models. No data leaves your device and 100% private.

Language:PythonLicense:Apache-2.0Stargazers:19414Issues:163Issues:522

deepdarkCTI

Collection of Cyber Threat Intelligence sources from the deep and dark web

Network-segmentation-cheat-sheet

Best practices for segmentation of the corporate network of any company

BlueTeam-Tools

Tools and Techniques for Blue Team / Incident Response

LME

Logging Made Easy (LME) is a no-cost and open logging and protective monitoring solution serving all organizations.

Language:PythonLicense:NOASSERTIONStargazers:752Issues:18Issues:172

C2IntelFeeds

Automatically created C2 Feeds

Language:REXXLicense:NOASSERTIONStargazers:452Issues:30Issues:15

awesome-llm-cybersecurity-tools

A curated list of large language model tools for cybersecurity research.

TTPForge

The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).

Language:GoLicense:MITStargazers:294Issues:10Issues:140

awesome-detection-rules

This is a collection of threat detection rules / rules engines that I have come across.

llm-mistral-invoice-cpu

Data extraction with LLM on CPU

Language:PythonLicense:Apache-2.0Stargazers:245Issues:8Issues:9

Business-Email-Compromise-Guide

The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the process of identifying, collecting and analysing activity associated with BEC intrusions.

mercator

Mapping the information system / Cartographie du système d'information

Language:BladeLicense:GPL-3.0Stargazers:214Issues:10Issues:164

logmine

A log pattern analyzer CLI

Language:PythonLicense:MITStargazers:168Issues:9Issues:7

docker

OpenCTI Docker deployment helpers

cti-stix2-json-schemas

OASIS TC Open Repository: Non-normative schemas and examples for STIX 2

Language:ANTLRLicense:BSD-3-ClauseStargazers:106Issues:20Issues:68

MDTI-Solutions

Repository to publish sample use cases, templates, solutions, automations for Microsoft Defender Threat Intelligence (MDTI) product

Language:Jupyter NotebookLicense:MITStargazers:72Issues:12Issues:2

openwec

An implementation of a Windows Event Collector server running on GNU/Linux.

Language:RustLicense:GPL-3.0Stargazers:37Issues:9Issues:7

Rapports-Techniques

Rapports techniques de VIGINUM

docs

OpenCTI Documentation Space

defensive-project-ideas

Ideas for projects for defensive research or blue teaming

pySigma-backend-QRadar-AQL

QRadar AQL backend for converting Sigma rules to QRadar AQL queries

Language:PythonLicense:MITStargazers:9Issues:6Issues:1

advise

The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management

Language:PythonLicense:AGPL-3.0Stargazers:7Issues:3Issues:1

blocker

blocker is a Python package that checks indicators against block lists

Language:PythonLicense:MITStargazers:4Issues:2Issues:0

oxa

OXA - Open XDR architecture

License:NOASSERTIONStargazers:4Issues:5Issues:0
Language:PythonLicense:GPL-3.0Stargazers:4Issues:0Issues:0

mbc-stix2.1

MBC v3.0 expressed using the STIX 2.1 Malware Behavior Extension

License:Apache-2.0Stargazers:2Issues:2Issues:0
Language:HTMLStargazers:1Issues:0Issues:0