Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for cyber threat intelligence
cyber-threat-intelligence
x
85 search results found
Reverse Engineering
⭐
9,941
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Intelowl
⭐
3,108
IntelOwl: manage your Threat Intelligence at scale
Attack Navigator
⭐
1,791
Web app that provides basic navigation and annotation of ATT&CK matrices
Cti
⭐
1,561
Cyber Threat Intelligence Repository expressed in STIX 2.0
Adversary_emulation_library
⭐
1,419
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Cortex
⭐
1,237
Cortex: a Powerful Observable Analysis and Active Response Engine
Hacking Windows
⭐
1,014
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Car
⭐
844
Cyber Analytics Repository
Attack Scripts
⭐
556
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Attack Flow
⭐
470
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
Attack Website
⭐
440
MITRE ATT&CK Website
Attack Control Framework Mappings
⭐
427
Security control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Cortex Analyzers
⭐
400
Cortex Analyzers Repository
Cti Python Stix2
⭐
332
OASIS TC Open Repository: Python APIs for STIX 2
Mitreattack Python
⭐
322
A python module for working with ATT&CK
Tram
⭐
306
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
Attack Stix Data
⭐
254
STIX data representing MITRE ATT&CK
Opentaxii
⭐
180
TAXII server implementation in Python from EclecticIQ
Cti Blueprints
⭐
116
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
Greedybear
⭐
116
Threat Intel Platform for T-POTs
Cti Stix Visualization
⭐
115
OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships
Cti Stix2 Json Schemas
⭐
100
OASIS TC Open Repository: Non-normative schemas and examples for STIX 2
Top Attack Techniques
⭐
99
Top ATT&CK Techniques provides defenders with a systematic approach to prioritizing ATT&CK techniques.
Cti Taxii Server
⭐
94
OASIS TC Open Repository: TAXII 2 Server Library Written in Python
Cti Taxii Client
⭐
91
OASIS TC Open Repository: TAXII 2 Client Library Written in Python
Cti Documentation
⭐
87
OASIS TC Open Repository: GitHub Pages site for STIX and TAXII
Insider Threat Ttp Kb
⭐
82
The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat TTP Knowledge Base, built upon data collected on insider threat incidents and lessons learned and experience from the ATT&CK knowledge base.
Secbert
⭐
61
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
Attack_to_veris
⭐
59
The principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Attack Powered Suit
⭐
58
ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, context menus, and ATT&CK Navigator integration.
Cyber_threat_intelligence
⭐
55
Cyber Threat Intelligence Data, Indicators, and Analysis
Cti Stix Elevator
⭐
47
OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON
Exploring Apt Campaigns
⭐
44
Further investigation in to APT campaigns disclosed by private security firms and security agencies
Cti Stix Validator
⭐
44
OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices
Threatreportextractor
⭐
44
Extracting Attack Behavior from Threat Reports
Zeek Network Security Monitor
⭐
42
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Misp Stix
⭐
39
MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats
Stixview
⭐
39
STIX2 graph visualisation library in JS
Documentation
⭐
38
SEKOIA.IO Documentation - The Intelligence-Driven SaaS SIEM
Pywhatcms
⭐
36
Unofficial WhatCMS API package
Cti Stix Generator
⭐
35
OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/cti-stix-generator
Abused Legitimate Services
⭐
32
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Pofr
⭐
31
Penguin OS Forensic (or Flight) Recorder
Linkscyberthreatintelligence
⭐
27
Alguns links legais para quem gostaria de entender mais sobre os fundamentos de CTI. Pra quem gostaria de contribuir, só aceitarei PR relacionado a conteúdos teóricos, como blogs, podcasts, videos, livros sendo conteúdos grátis ou baratos.
Attack Threat_intel
⭐
23
Graph Representation of MITRE ATT&CK's CTI data
Sightings_ecosystem
⭐
22
This project aims to fundamentally advance our collective ability to see threat activity across organizational, platform, vendor and geographical boundaries.
Chista
⭐
21
Chista | Open Threat Intelligence Framework
Cti Pattern Validator
⭐
20
OASIS TC Open Repository: Validate patterns used to express cyber observable content in STIX Indicators
Website
⭐
20
ATT&CK Evaluations Website
Cti Stix Slider
⭐
19
OASIS TC Open Repository: The repository cti-stix-slider supports development of a Python application to convert STIX 2.0 content to STIX 1.x content
Stix2.1 Coa Playbook Extension
⭐
19
A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-readable security playbooks such as CACAO Security Playbooks
Stix Icons
⭐
19
stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats according to the STIX language for intelligence exchange, defined by OASIS Cyber Threat Intelligence (CTI) TC
Jupyter Widget Stixview
⭐
18
STIX2 graph widget for Jupyter notebooks, powered by stixview library
Karakurt Hacking Team Cti
⭐
18
IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure
Yafra
⭐
16
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Cloud Analytics
⭐
16
Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as well as a blueprint for how others can create and use cloud analytics effectively.
Go Mispfeedgenerator
⭐
15
Golang implementation of PyMISP-feedgenerator
Cybersecurity Soar
⭐
14
A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Security Orchestration, Automation and Response (SOAR).
Mitrecnd.github.io
⭐
13
MITRE Shield website
Cti House
⭐
13
Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers
Stix Java
⭐
12
STIX 2.x Java Library
Associated Threat Analyzer
⭐
12
Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious domain and IPv4 lists.
Whathitme
⭐
11
WhatHitMe is a Python3 tool which provides the possible Groups and their attributed Campaigns that may have attacked you in an incident, based on specific Techniques and Software you have identified (MITRE ATT&CK). It supports both enterprise, mobile and ICS matrixes. It also provides searches to known sources for these Groups for insight!
Cybersecurity Threat Intelligence
⭐
10
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.
Security Playbook Stix Misp Exchange
⭐
10
This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that make use of the Security Playbook extension and MISP Security Playbook objects.
Covid 19 Cti
⭐
9
A collection of Covid-19 related threat intelligence and resources.
Cybersecurity Blue Team
⭐
9
A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team in Cybersecurity.
Analyst Tool
⭐
8
Analyst Tool to automate some of an analyst's daily investigation tasks. In both python script and Jupyter Notebook format.
Metemcyber
⭐
8
Decentralized Cyber Threat Intelligence Kaizen Framework
Cti Quiz
⭐
8
Practice CTI Quiz
Sacti
⭐
8
SACTI - Securely aggregate CTI sightings and report them on MISP
Taxii Server
⭐
7
TAXII Server supporting the 2.1 spec.
Enterpriseattack
⭐
7
A lightweight Python module to interact with the Mitre Att&ck Enterprise dataset.
Ail Feeder Leak
⭐
7
AIL LeakFeeder: A Module for AIL Framework that automate the process to feed leaked files automatically
Cip Nse Script
⭐
7
The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products, versions, CVEs, etc.
Toyos
⭐
6
ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.
Redpill
⭐
6
Mitre Framework Based Quantitative Risk Simulation
Groundtruths
⭐
6
Knowledgebase of universal truths and technical analysis caveats for CTI and DFIR, in one place.
Cybersecurity Web Security
⭐
6
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Web Security in Cybersecurity.
Cybersecurityauditscript
⭐
6
Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.
Patternex Feed
⭐
5
PatternEx domain feed: malicious domains detected with AI
Ti_scraper
⭐
5
Highly configurable scripts for a web scraper intended to be used for cyber threat intelligence
Threatscenario
⭐
5
A new way for you to structure your threat content.
Thotcon0xb
⭐
5
THOTCON 0xB Adversary Detection Pipelines Talk on 10/8/2021 in Chicago, IL.
Stix Faker
⭐
5
STIX 2 Fake Data Generator
1-85 of 85 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.