Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for cybersecurity cyber threat intelligence
cyber-threat-intelligence
x
cybersecurity
x
44 search results found
Reverse Engineering
⭐
9,941
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Intelowl
⭐
3,108
IntelOwl: manage your Threat Intelligence at scale
Attack Navigator
⭐
1,791
Web app that provides basic navigation and annotation of ATT&CK matrices
Adversary_emulation_library
⭐
1,419
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Hacking Windows
⭐
1,014
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Car
⭐
844
Cyber Analytics Repository
Attack Scripts
⭐
556
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Attack Flow
⭐
470
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
Attack Website
⭐
440
MITRE ATT&CK Website
Attack Control Framework Mappings
⭐
427
Security control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Mitreattack Python
⭐
322
A python module for working with ATT&CK
Tram
⭐
306
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
Attack Stix Data
⭐
254
STIX data representing MITRE ATT&CK
Cti Blueprints
⭐
116
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
Greedybear
⭐
116
Threat Intel Platform for T-POTs
Top Attack Techniques
⭐
99
Top ATT&CK Techniques provides defenders with a systematic approach to prioritizing ATT&CK techniques.
Insider Threat Ttp Kb
⭐
82
The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat TTP Knowledge Base, built upon data collected on insider threat incidents and lessons learned and experience from the ATT&CK knowledge base.
Secbert
⭐
61
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
Attack_to_veris
⭐
59
The principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Threatreportextractor
⭐
44
Extracting Attack Behavior from Threat Reports
Exploring Apt Campaigns
⭐
44
Further investigation in to APT campaigns disclosed by private security firms and security agencies
Zeek Network Security Monitor
⭐
42
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stixview
⭐
39
STIX2 graph visualisation library in JS
Documentation
⭐
38
SEKOIA.IO Documentation - The Intelligence-Driven SaaS SIEM
Abused Legitimate Services
⭐
32
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Pofr
⭐
31
Penguin OS Forensic (or Flight) Recorder
Linkscyberthreatintelligence
⭐
27
Alguns links legais para quem gostaria de entender mais sobre os fundamentos de CTI. Pra quem gostaria de contribuir, só aceitarei PR relacionado a conteúdos teóricos, como blogs, podcasts, videos, livros sendo conteúdos grátis ou baratos.
Sightings_ecosystem
⭐
22
This project aims to fundamentally advance our collective ability to see threat activity across organizational, platform, vendor and geographical boundaries.
Chista
⭐
21
Chista | Open Threat Intelligence Framework
Website
⭐
20
ATT&CK Evaluations Website
Karakurt Hacking Team Cti
⭐
18
IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure
Jupyter Widget Stixview
⭐
18
STIX2 graph widget for Jupyter notebooks, powered by stixview library
Yafra
⭐
16
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Cloud Analytics
⭐
16
Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as well as a blueprint for how others can create and use cloud analytics effectively.
Go Mispfeedgenerator
⭐
15
Golang implementation of PyMISP-feedgenerator
Mitrecnd.github.io
⭐
13
MITRE Shield website
Cti House
⭐
13
Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers
Stix Java
⭐
12
STIX 2.x Java Library
Associated Threat Analyzer
⭐
12
Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious domain and IPv4 lists.
Cybersecurity Threat Intelligence
⭐
10
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.
Covid 19 Cti
⭐
9
A collection of Covid-19 related threat intelligence and resources.
Cybersecurity Blue Team
⭐
9
A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team in Cybersecurity.
Cti Quiz
⭐
8
Practice CTI Quiz
Analyst Tool
⭐
8
Analyst Tool to automate some of an analyst's daily investigation tasks. In both python script and Jupyter Notebook format.
Ail Feeder Leak
⭐
7
AIL LeakFeeder: A Module for AIL Framework that automate the process to feed leaked files automatically
Cybersecurityauditscript
⭐
6
Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.
Toyos
⭐
6
ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.
Thotcon0xb
⭐
5
THOTCON 0xB Adversary Detection Pipelines Talk on 10/8/2021 in Chicago, IL.
Ti_scraper
⭐
5
Highly configurable scripts for a web scraper intended to be used for cyber threat intelligence
Related Searches
Python Cybersecurity (600)
Security Cybersecurity (402)
Penetration Testing Cybersecurity (225)
Cybersecurity Information Security (163)
Cybersecurity Osint (146)
Malware Cybersecurity (122)
Javascript Cybersecurity (113)
Html Cybersecurity (108)
Security Tools Cybersecurity (108)
1-44 of 44 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.