Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
☆794Feb 8, 2026Updated 2 months ago
Alternatives and similar repositories for Open-source-tools-for-CTI
Users that are interested in Open-source-tools-for-CTI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆720Apr 25, 2026Updated last week
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Jun 4, 2022Updated 3 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆149Nov 27, 2025Updated 5 months ago
- The Threat Actor Profile Guide for CTI Analysts☆120Jul 15, 2023Updated 2 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,824Apr 28, 2026Updated last week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆288Mar 20, 2025Updated last year
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆205Jul 3, 2024Updated last year
- Practice CTI Quiz☆13Mar 20, 2024Updated 2 years ago
- A resource containing all the tools each ransomware gangs uses☆1,355Apr 1, 2026Updated last month
- ☆216Jun 5, 2025Updated 11 months ago
- A curated list of Awesome Threat Intelligence Blogs☆540Apr 27, 2026Updated last week
- Cyber Threat Intelligence Data, Indicators, and Analysis☆111Jan 20, 2026Updated 3 months ago
- A curated list of Awesome Threat Intelligence resources☆10,136Jan 19, 2026Updated 3 months ago
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆611Dec 4, 2025Updated 5 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Awesome list of keywords and artifacts for Threat Hunting sessions☆655Aug 4, 2025Updated 9 months ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆655Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆826Apr 28, 2026Updated last week
- Open Cyber Threat Intelligence Platform☆9,207Apr 28, 2026Updated last week
- Extract and aggregate threat intelligence.☆913Jan 31, 2024Updated 2 years ago
- ☆161Apr 6, 2026Updated 3 weeks ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆726Dec 26, 2022Updated 3 years ago
- ☆509Oct 7, 2024Updated last year
- ☆24Sep 28, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Collection of Jupyter Notebooks by @fr0gger_☆195Dec 16, 2025Updated 4 months ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,306Jun 1, 2023Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- A query aggregator for OSINT based threat hunting☆938Mar 7, 2026Updated last month
- Cyber Underground General Intelligence Requirements☆100Feb 2, 2024Updated 2 years ago
- Awesome Security lists for SOC/CERT/CTI☆1,437Updated this week
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,768Apr 16, 2026Updated 2 weeks ago
- Detect Tactics, Techniques & Combat Threats☆2,286Updated this week
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,541Jan 12, 2026Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Sophos-originated indicators-of-compromise from published reports☆661Mar 31, 2026Updated last month
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆935Jun 26, 2023Updated 2 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,974Apr 23, 2026Updated last week
- Watcher - Open Source AI-powered Cyber Threat Intelligence & Hunting Platform. Developed with Django & React JS.☆1,268Apr 27, 2026Updated last week
- Cybercrime forums for Cyber Threat Intelligence purpose☆93Sep 25, 2019Updated 6 years ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆1,070Oct 5, 2023Updated 2 years ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆415Apr 6, 2026Updated 3 weeks ago