Hiryu Logo

Hiryu

0
Free
Visit Website

Hiryu is a visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC. It can store mostly schemaless node and relation on local DB, and can use Neo4j GraphDB as backend. Quick Start: Requirements: Redis Neo4j (Optional): confirmed version 3.4.7 works Set up virtualenv and install python packages. Create Django Project and Install Hiryu: 1) Add 'Hiryu' to INSTALLED_APPS as follows: INSTALLED_APPS = [ ... 'Hiryu', ] 2) Edit DATABASES (e.g. postgresql) DATABASES = { 'default': { 'ENGINE': 'django.db.backends.postgresql_psycopg2', 'NAME': '<DB name>', 'USER': '<DB user>', 'PASSWORD': '<DB password>', } }

FEATURES

ALTERNATIVES

A library of adversary emulation plans to evaluate defensive capabilities against real-world threats.

A collection of Yara rules licensed under the DRL 1.1 License.

Open Source Intelligence solution for threat intelligence data enrichment and quick analysis of suspicious files or malware.

A platform for accessing threat intelligence and collaborating on cyber threats.

A curated collection of Sigma & Yara rules and Indicators of Compromise (IOCs) for threat detection and malware identification.

VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.

A Python library for handling TAXII v1.x Messages and invoking TAXII Services.

A community-driven list of sample security analytics for auditing cloud usage and detecting threats in Google Cloud.