DISARMFoundation / DISARMframeworksLinks
Master copies of the DISARM frameworks, with generated files to help you explore the data
☆259Updated 8 months ago
Alternatives and similar repositories for DISARMframeworks
Users that are interested in DISARMframeworks are comparing it to the libraries listed below
Sorting:
- AMITT (Adversarial Misinformation and Influence Tactics and Techniques) framework for describing disinformation incidents. Includes TTPs …☆240Updated 3 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆123Updated last week
- Intelligence Architecture Mind Map☆138Updated last year
- ☆277Updated 3 months ago
- A curated list of Awesome Threat Intelligence Blogs☆470Updated 2 weeks ago
- Collection of Jupyter Notebooks by @fr0gger_☆185Updated 2 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆269Updated 3 months ago
- Cyber Underground General Intelligence Requirements☆96Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆115Updated 2 years ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆29Updated last week
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆272Updated 8 months ago
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆576Updated last week
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆168Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆125Updated 2 years ago
- MISP Playbooks☆219Updated last month
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆77Updated last week
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆199Updated last month
- Dictionary of CTI-related acronyms, terms, and jargon☆145Updated 2 weeks ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆199Updated last year
- Lacus is a capturing system using playwright, as a web service.☆95Updated this week
- A curated list of Awesome Threat Intelligence blogs☆88Updated 2 years ago
- Ransomware leak site monitoring☆315Updated 3 years ago
- Resources, tools and utilities about Threat Intelligence☆74Updated 2 years ago
- ☆133Updated 2 years ago
- Map tracking ransomware, by OCD World Watch team☆480Updated 9 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆291Updated last month
- Yet another Ransomware gang tracker☆544Updated this week
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆114Updated last year
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆93Updated this week