There are 15 repositories under threat topic.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
The Correlated CVE Vulnerability And Threat Intelligence Database API
SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS
WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)
SIEM Tactics, Techiques, and Procedures
a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations on decentralized finance
A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.
A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigating security risks.
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.
This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return results as STIX Observations.
国内恶意IP封禁计划,还赛博空间一片朗朗乾坤
PatrowlHears - Vulnerability Intelligence Center / Exploits
Repository resource for threat hunter
Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases
:shower: Sanitising your documents, one threat at a time. — Content Disarm & Reconstruction Software
ThreatSeeker: Threat Hunting via Windows Event Logs
Consolidation of various resources related to Microsoft Sysmon & sample data/log
MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU
With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerability information in our vulnerability reports database. See also https://github.com/CERTCC/Vulnerability-Data-Archive-Tools
Curating Falco rules with MITRE ATT&CK Matrix
Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. Sugar-Free and Secure: no any external dependencies except for chart plotting are used
The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP systems, helping users identify security risks and vulnerabilities. With features like inputting SAP credentials, scanning for connections, and visualizing the network.
Quick analysis focusing on most important of a Malware or a Threat
A simple threat meter for WoW Classic (1.13.2)