Semi-Automated Cyber Threat Intelligence or ACT is a research project led by mnemonic as with contributions from the University of Oslo, NTNU, Norwegian Security Authority (NSM), KraftCERT and Nordic Financial CERT.
The main objective of the ACT project is to develop a platform for cyber threat intelligence to uncover cyber attacks, cyber espionage and sabotage. The project will result in new methods for data enrichment and data analysis to enable identification of threat agents, their motives, resources and attack methodologies. In addition, the project will develop new methods, work processes and mechanisms for creating and distributing threat intelligence and countermeasures to stop ongoing and prevent future attacks.
In this repository the code of the ACT platform is published under an Open Source license.
Also Read – Shodan Eye : Tool Collects All The Information About All Devices Directly Connected To The Internet
Installation
deployment-service/resources/cassandra.cql
.mvn clean install -DskipTests
from the repository’s root folder to compile the code.docker pull cassandra
.docker pull docker.elastic.co/elasticsearch/elasticsearch:6.8.3
.docker pull webcenter/activemq
.mvn clean install
for running all tests including integration tests.mvn clean install -DskipSlowTests
for skipping the integration tests.Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open…
While file extensions in Linux are optional and often misleading, the file command helps decode what a…
The touch command is one of the quickest ways to create new empty files or update timestamps…
Handling large numbers of files is routine for Linux users, and that’s where the find command shines.…
Managing files and directories is foundational for Linux workflows, and the mv (“move”) command makes it easy…
Creating directories is one of the earliest skills you'll use on a Linux system. The mkdir (make…