Trending repositories for topic cyber-threat-intelligence
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Web app that provides basic navigation and annotation of ATT&CK matrices
Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syntax of popular search engines.
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows f...
Cortex: a Powerful Observable Analysis and Active Response Engine
Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syntax of popular search engines.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows f...
Web app that provides basic navigation and annotation of ATT&CK matrices
Cortex: a Powerful Observable Analysis and Active Response Engine
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows f...
Web app that provides basic navigation and annotation of ATT&CK matrices
Cortex: a Powerful Observable Analysis and Active Response Engine
Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syntax of popular search engines.
Intelligence Blocklist (IPv4). DST = France & Belgium
Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syntax of popular search engines.
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows f...
Intelligence Blocklist (IPv4). DST = France & Belgium
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Cortex: a Powerful Observable Analysis and Active Response Engine
Web app that provides basic navigation and annotation of ATT&CK matrices
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows f...
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
Web app that provides basic navigation and annotation of ATT&CK matrices
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Cortex: a Powerful Observable Analysis and Active Response Engine
Intelligence Blocklist (IPv4). DST = France & Belgium
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
A curated collection of free or freemium web-based penetration testing and vulnerability analysis tools. These tools assist security professionals and enthusiasts in discovering, assessing, and managi...
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Security Orchestration, Automation and Response (SOAR).
A curated collection of free or freemium web-based penetration testing and vulnerability analysis tools. These tools assist security professionals and enthusiasts in discovering, assessing, and managi...
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows f...
Intelligence Blocklist (IPv4). DST = France & Belgium
To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing pages and other malicious or sketch af financial/crypto fraud w...
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Security Orchestration, Automation and Response (SOAR).
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships
Web app that provides basic navigation and annotation of ATT&CK matrices
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Cortex: a Powerful Observable Analysis and Active Response Engine
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
A curated collection of free or freemium web-based penetration testing and vulnerability analysis tools. These tools assist security professionals and enthusiasts in discovering, assessing, and managi...
Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.
Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syntax of popular search engines.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Web app that provides basic navigation and annotation of ATT&CK matrices
Cortex: a Powerful Observable Analysis and Active Response Engine
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows f...
Intelligence Blocklist (IPv4). DST = France & Belgium
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead in the field. It provides a valuable resource for those dedica...
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
This repository contains 130 malware and ransomware samples for research and analysis purposes.
This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead in the field. It provides a valuable resource for those dedica...
Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syntax of popular search engines.
To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing pages and other malicious or sketch af financial/crypto fraud w...
Automated threat intel feed parsing and consolidation💻👾🤖
Intelligence Blocklist (IPv4). DST = France & Belgium
A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team in Cybersecurity.
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Security Orchestration, Automation and Response (SOAR).
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows f...