It was created by ASPI’s International Cyber Policy Centre.Ĭategory: academic-institution - source: ASPI International Cyber Policy Centre - total: 159 elements China Defence Universities TrackerĬhina Defence Universities Tracker - The China Defence Universities Tracker is a database of Chinese institutions engaged in military or security-related science and technology research. For this reason, some specific commands will be obfuscated or parts will be omitted to prevent abuse.Ĭategory: atrm - source: - total: 89 elementsĪttck4fraud - attck4fraud - Principles of MITRE ATT&CK in the fraud domainĬategory: guidelines - source: Open Sources - total: 71 elementsĬategory: tool - source: Open Sources - total: 16 elementsĬategory: tool - source: Open Sources - total: 53 elementsīhadra Framework - Bhadra Threat Modeling FrameworkĬategory: mobile - source: - total: 47 elementsĬategory: tool - source: MISP Project - total: 76 elementsīranded Vulnerability - List of known vulnerabilities and attacks with a brandingĬategory: vulnerability - source: Open Sources - total: 14 elementsĬategory: sector - source: CERT-EU - total: 6 elements It is not to teach how to weaponize or specifically abuse them. Azure Threat Research MatrixĪzure Threat Research Matrix - The purpose of the Azure Threat Research Matrix (ATRM) is to educate readers on the potential of Azure-based tactics, techniques, and procedures (TTPs). Available Galaxy - clusters 360.net Threat Actorsģ60.net Threat Actors - Known or estimated adversary groups as identified by 360.net.Ĭategory: actor - source: - total: 42 elementsĪndroid - Android malware galaxy based on multiple open sources.Ĭategory: tool - source: Open Sources - total: 433 elements To localized information (which is not shared) or additional information (that can be shared). The objective is to have a comment set of clusters for organizations starting analysis but that can be expanded Galaxies can be also used to expressed existing matrix-like standards such as MITRE ATT&CK(tm) or custom ones. To each cluster to permit a limited or broader distribution scheme. ThereĪre default knowledge base (such as Threat Actors, Tools, Ransomware, ATT&CK matrixes) available in MISP galaxyīut those can be overwritten, replaced, updated, forked and shared as you wish.Įxisting clusters and vocabularies can be used as-is or as a common knowledge base. A cluster can be composed of one or more elements. A lot of other applications I use seem to install and run perfectly within the sandbox too.MISP galaxy is a simple method to express a large object called cluster that can be attached to MISP events orĪttributes. And since there's very good online syncing for both browsers, I don't have to worry about losing settings when re-installing (that is, deleting the sandbox and installing it sandboxed again) etc. I don't have any third party browsers installed, as Chrome and Firefox seem to install and run perfectly for me within the sandbox. Since (reluctantly) moving to Windows 7 (from XP), I've only got a handful of third party software that's actually written on my REAL system. I've always felt that minimising third party software written on the REAL system is important from a security point of view - the more software there is, the more chance of exploitation. Zerjetfuel wrote:and yes I did have GOG galaxy on my host machine installed previously but I uninstalled it, apparently it didn't uninstall the service, this is what I mean with clutter/trash, and why I prefer things in SBIE since there I can just completely wipe it.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |