Tiago Sequeira (tiagosequeira)

tiagosequeira

Geek Repo

Location:Lisbon

Twitter:@_x13

Github PK Tool:Github PK Tool

Tiago Sequeira's starred repositories

APTnotes

Various public documents, whitepapers and articles about APT campaigns

APT_REPORT

Interesting APT Report Collection And Some Special IOC

msticpy

Microsoft Threat Intelligence Security Tools

Language:PythonLicense:NOASSERTIONStargazers:1772Issues:54Issues:191

EDR-Telemetry

This project aims to compare and evaluate the telemetry of various EDR products.

APT-Hunter

APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity

Language:PythonLicense:GPL-3.0Stargazers:1255Issues:47Issues:25

Ransomware-Tool-Matrix

A resource containing all the tools each ransomware gangs uses

yara-x

A rewrite of YARA in Rust.

Language:RustLicense:BSD-3-ClauseStargazers:656Issues:18Issues:90

stride-gpt

An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRIDE methodology.

Language:PythonLicense:MITStargazers:479Issues:19Issues:24

vulnrichment

A repo to conduct vulnerability enrichment.

tram

TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.

Language:Jupyter NotebookLicense:Apache-2.0Stargazers:451Issues:77Issues:110

galah

Galah: An LLM-powered web honeypot.

Language:GoLicense:Apache-2.0Stargazers:410Issues:9Issues:12

APT-Attack-Simulation

This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here.

Language:PythonStargazers:372Issues:7Issues:0

awesome_threat_intel_blogs

A curated list of Awesome Threat Intelligence Blogs

License:NOASSERTIONStargazers:330Issues:17Issues:0

cti-blueprints

CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.

Language:TypeScriptLicense:Apache-2.0Stargazers:202Issues:63Issues:2

CTI-Analyst-Challenge

An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.

misp-playbooks

MISP Playbooks

Language:Jupyter NotebookLicense:BSD-2-ClauseStargazers:174Issues:10Issues:54

DocIntel

Open Source Platform for storing, organizing, and searching documents related to cyber threats

Language:JavaScriptLicense:NOASSERTIONStargazers:157Issues:5Issues:100

Sigma-Rules

A repository of my own Sigma detection rules.

diana

Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )

Language:PythonLicense:MITStargazers:152Issues:4Issues:4

insider-threat-ttp-kb

The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat TTP Knowledge Base, built upon data collected on insider threat incidents and lessons learned and experience from the ATT&CK knowledge base.

Language:PythonLicense:Apache-2.0Stargazers:137Issues:79Issues:2

n6

Automated handling of data feeds for security teams

Language:PythonLicense:AGPL-3.0Stargazers:123Issues:23Issues:4

VeilTransfer

VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration techniques used by advanced threat actors, allowing organizations to evaluate and improve their security posture.

Language:GoLicense:GPL-3.0Stargazers:103Issues:2Issues:0

notes

Full of public notes and Utilities

Language:HTMLStargazers:82Issues:7Issues:0

cyber-threat-profiling

A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense

misp2sentinel

MISP to Sentinel integration

Language:PythonLicense:MITStargazers:58Issues:5Issues:80

pyHIDS

A HIDS (host-based intrusion detection system) for verifying the integrity of a system.

Language:PythonLicense:GPL-3.0Stargazers:57Issues:5Issues:4

cti-llm

An LLM for CTI reports - to be presented at FIRST Fukuoka 2024

Language:Jupyter NotebookStargazers:11Issues:5Issues:18