DISARMFoundation / DISARMframeworksLinks
Master copies of the DISARM frameworks, with generated files to help you explore the data
☆263Updated 10 months ago
Alternatives and similar repositories for DISARMframeworks
Users that are interested in DISARMframeworks are comparing it to the libraries listed below
Sorting:
- AMITT (Adversarial Misinformation and Influence Tactics and Techniques) framework for describing disinformation incidents. Includes TTPs …☆241Updated 3 years ago
- ☆284Updated 5 months ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆126Updated last week
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆589Updated last month
- The Threat Actor Profile Guide for CTI Analysts☆116Updated 2 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆191Updated last month
- A curated list of Awesome Threat Intelligence Blogs☆487Updated last week
- Intelligence Architecture Mind Map☆141Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Updated 2 years ago
- 🏴☠️💰 Another Ransomware gang tracker☆285Updated last week
- Cyber Underground General Intelligence Requirements☆97Updated last year
- Dictionary of CTI-related acronyms, terms, and jargon☆146Updated 2 months ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆169Updated 2 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆276Updated 10 months ago
- AIL framework - Analysis Information Leak framework☆871Updated this week
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆201Updated last year
- MISP Playbooks☆222Updated 3 months ago
- Lacus is a capturing system using playwright, as a web service.☆100Updated last week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Updated 2 years ago
- Ransomware leak site monitoring☆315Updated 3 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Updated 2 months ago
- The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World☆147Updated 3 weeks ago
- ☆132Updated 2 years ago
- A curated list of Awesome Threat Intelligence blogs☆97Updated 2 years ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆95Updated last month
- Resources, tools and utilities about Threat Intelligence☆79Updated 2 years ago
- Yet another Ransomware gang tracker☆555Updated 2 weeks ago
- List of past and future infosec related events.☆168Updated this week
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆31Updated last week
- Threat Intel Platform for T-POTs☆162Updated this week