Hiryu Logo

Hiryu

0
Free
Visit Website

Hiryu is a visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC. It can store mostly schemaless node and relation on local DB, and can use Neo4j GraphDB as backend. Quick Start: Requirements: Redis Neo4j (Optional): confirmed version 3.4.7 works Set up virtualenv and install python packages. Create Django Project and Install Hiryu: 1) Add 'Hiryu' to INSTALLED_APPS as follows: INSTALLED_APPS = [ ... 'Hiryu', ] 2) Edit DATABASES (e.g. postgresql) DATABASES = { 'default': { 'ENGINE': 'django.db.backends.postgresql_psycopg2', 'NAME': '<DB name>', 'USER': '<DB user>', 'PASSWORD': '<DB password>', } }

FEATURES

ALTERNATIVES

Python APIs for serializing and de-serializing STIX2 JSON content with higher-level APIs for common tasks.

A library of adversary emulation plans to evaluate defensive capabilities against real-world threats.

Nessus efficiently scans for system vulnerabilities, misconfigurations, and compliance issues.

Collect various intelligence sources for hosts in CSV format.

eCrimeLabs provides a SOAR platform for threat detection and response, integrated with MISP.

FireEye Mandiant SunBurst Countermeasures: freely available rules for detecting malicious files and activity

A framework for managing cyber threat intelligence in structured formats.

An Open Source solution for management of Threat Intelligence at scale, integrating multiple analyzers and malware analysis tools.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved