Trending repositories for topic cyber-threat-intelligence
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space
Cortex: a Powerful Observable Analysis and Active Response Engine
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space
Cortex: a Powerful Observable Analysis and Active Response Engine
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space
Web app that provides basic navigation and annotation of ATT&CK matrices
Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.
Cortex: a Powerful Observable Analysis and Active Response Engine
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.
Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Web app that provides basic navigation and annotation of ATT&CK matrices
Cortex: a Powerful Observable Analysis and Active Response Engine
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Web app that provides basic navigation and annotation of ATT&CK matrices
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
Cortex: a Powerful Observable Analysis and Active Response Engine
Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows f...
Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.
A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Security Orchestration, Automation and Response (SOAR).
Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc
TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.
TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.
A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Security Orchestration, Automation and Response (SOAR).
This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead in the field. It provides a valuable resource for those dedica...
Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space
Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syntax of popular search engines.
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead in the field. It provides a valuable resource for those dedica...
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syntax of popular search engines.
Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Web app that provides basic navigation and annotation of ATT&CK matrices
Cortex: a Powerful Observable Analysis and Active Response Engine
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows f...
Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead in the field. It provides a valuable resource for those dedica...
This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.
Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers
Modular web-application honeypot platform built using go and gin
Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers
Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syntax of popular search engines.
This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.
Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space
A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team in Cybersecurity.
A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Security Orchestration, Automation and Response (SOAR).
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat TTP...