BushidoUK / CTI-Quiz
Practice CTI Quiz
☆14Updated last year
Alternatives and similar repositories for CTI-Quiz:
Users that are interested in CTI-Quiz are comparing it to the libraries listed below
- Collection of videos of Raids on Cybercriminals☆19Updated last month
- Sniffing out well-known threat groups☆28Updated 8 months ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆27Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 2 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆32Updated last year
- Ransomware groups posts☆39Updated this week
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 9 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- ☆47Updated this week
- Building a consolidated RSS feed for articles about cyberattacks☆67Updated this week
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated 11 months ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆43Updated last year
- Capture screenshots of onion services on an onion service.☆48Updated 10 months ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆12Updated 2 years ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆76Updated last week
- The Threat Actor Profile Guide for CTI Analysts☆106Updated last year
- Cyber Underground General Intelligence Requirements☆92Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆87Updated 5 months ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆41Updated 2 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆48Updated last month
- The Ransomware.live API Server is a Flask-based web application that provides endpoints to query and retrieve data related to ransomware …☆20Updated 5 months ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated last month
- Dictionary of CTI-related acronyms, terms, and jargon☆140Updated last year
- Tor onion address lookup☆38Updated 2 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆27Updated last month
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 5 months ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 10 months ago
- ☆141Updated last year
- BlackBerry Threat Research & Intelligence☆98Updated last year