NECOMA Logo

NECOMA

0
Free
Visit Website

NECOMA addresses the aspect of data collection, leveraging past and current work on the topic with the goal to expand these existing mechanisms and orient them towards threat data analysis. It also focuses on threat data analysis from the perspective of understanding attackers and vulnerabilities, as well as from the point of view of the target and victim, needing to protect itself in real-time and in the most efficient manner possible. Additionally, NECOMA aims to develop and demonstrate new cyberdefense mechanisms that leverage metrics for deployment and evaluation, analyzing both infrastructure (networks and large computing infrastructures) and endpoints (smartphones and browsers). The results of the NECOMA project will be showcased in demonstrators that highlight the innovations of the project and prepare exploitation.

FEATURES

ALTERNATIVES

An informational repo about hunting for adversaries in your IT environment.

CIFv3 is the next version of the Cyber Intelligence Framework, developed against Ubuntu16, encouraging users to transition from CIFv2.

A system for collecting, managing, and distributing security information on a large scale, developed by CERT Polska.

A collection of companies that disclose adversary TTPs after being breached, useful for analysis of intrusions.

A collection of Yara rules licensed under the DRL 1.1 License.

Automatically create yara rules based on images embedded in office documents.

Parse IOCs from text

An all-in-one email outreach platform for finding and connecting with professionals, with features for lead discovery, email verification, and cold email campaigns.

PINNED