Hiryu Logo

Hiryu

0
Free
Visit Website

Hiryu is a visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC. It can store mostly schemaless node and relation on local DB, and can use Neo4j GraphDB as backend. Quick Start: Requirements: Redis Neo4j (Optional): confirmed version 3.4.7 works Set up virtualenv and install python packages. Create Django Project and Install Hiryu: 1) Add 'Hiryu' to INSTALLED_APPS as follows: INSTALLED_APPS = [ ... 'Hiryu', ] 2) Edit DATABASES (e.g. postgresql) DATABASES = { 'default': { 'ENGINE': 'django.db.backends.postgresql_psycopg2', 'NAME': '<DB name>', 'USER': '<DB user>', 'PASSWORD': '<DB password>', } }

FEATURES

ALTERNATIVES

Packet Storm is a global security resource providing around-the-clock information and tools to mitigate personal data and fiscal loss on a global scale.

SeaSponge is an accessible web-based threat modeling tool with a focus on accessibility, aesthetics, and intuitive user experience.

Automatic YARA rule generator based on Koodous reports with limited false positives.

A project focusing on understanding and combating threats to the Internet economy and net citizens.

A free and open-source OSINT framework for gathering and analyzing data from various sources

A mapping tool that correlates MITRE ATT&CK techniques with atomic tests and detection rules to analyze security detection coverage.

A tool to extract indicators of compromise from security reports in PDF format.

Platform for the latest threat intelligence information