Hiryu Logo

Hiryu

0
Free
Visit Website

Hiryu is a visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC. It can store mostly schemaless node and relation on local DB, and can use Neo4j GraphDB as backend. Quick Start: Requirements: Redis Neo4j (Optional): confirmed version 3.4.7 works Set up virtualenv and install python packages. Create Django Project and Install Hiryu: 1) Add 'Hiryu' to INSTALLED_APPS as follows: INSTALLED_APPS = [ ... 'Hiryu', ] 2) Edit DATABASES (e.g. postgresql) DATABASES = { 'default': { 'ENGINE': 'django.db.backends.postgresql_psycopg2', 'NAME': '<DB name>', 'USER': '<DB user>', 'PASSWORD': '<DB password>', } }

FEATURES

ALTERNATIVES

Container of 200 Windows EVTX samples for testing detection scripts and training on DFIR.

RiskAnalytics Solutions offers community projects for cyber threat intelligence sharing and collaboration.

A tool for tracking, scanning, and filtering yara files with distributed scanning capabilities.

A threat intelligence and vulnerability monitoring platform that aggregates security alerts from trusted sources and provides customizable monitoring and notification capabilities.

eCrimeLabs provides a SOAR platform for threat detection and response, integrated with MISP.

A repository to aid Windows threat hunters in looking for common artifacts.

Powershell Threat Hunting Module for scanning remote endpoints and collecting comprehensive information.

A serverless application for creating and monitoring URL tokens with threat intelligence and customizable alerts.