Intelligence Architecture Mind Map
☆147Mar 15, 2024Updated 2 years ago
Alternatives and similar repositories for IntelArchitectureMap
Users that are interested in IntelArchitectureMap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A list of Per-Reviewed Journals, Books and Blogs on intelligence and Cybersecurity☆26Apr 1, 2024Updated 2 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆128Dec 5, 2023Updated 2 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 10 months ago
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆613Dec 4, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- Converting data from services like Censys and Shodan to a common data model☆52May 11, 2026Updated last week
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 9 months ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆98Jan 8, 2026Updated 4 months ago
- Placeholder for IRIS-H Digital Forensics Tool☆15May 30, 2018Updated 7 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- The Threat Actor Profile Guide for CTI Analysts☆120Jul 15, 2023Updated 2 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆170Nov 10, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Simulate Windows EXE for Malware Research!☆20Sep 4, 2024Updated last year
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆52May 16, 2022Updated 4 years ago
- ETW forensic tool for Volatility3 plugin☆17Nov 15, 2024Updated last year
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆722Apr 25, 2026Updated 3 weeks ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆26Dec 1, 2022Updated 3 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Sep 16, 2023Updated 2 years ago
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆104Dec 13, 2023Updated 2 years ago
- Map tracking ransomware, by OCD World Watch team☆487Feb 20, 2026Updated 3 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆119Oct 29, 2024Updated last year
- ☆22Aug 29, 2024Updated last year
- ☆23May 22, 2023Updated 3 years ago
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆33Apr 1, 2024Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆101Feb 2, 2024Updated 2 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- MITRE ATT&CK Based App in Power BI☆18Feb 23, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Public Maltego Transforms☆24May 24, 2017Updated 8 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆44Jan 20, 2026Updated 4 months ago
- Discover gaps in Entra Conditional Access policies before attackers do☆122Mar 23, 2026Updated last month
- Dictionary of CTI-related acronyms, terms, and jargon☆149Nov 27, 2025Updated 5 months ago
- Threat Hunting tool about Sysmon and graphs☆339May 28, 2023Updated 2 years ago
- Local GOLANG Transform Wrapper for Maltego☆17Feb 25, 2016Updated 10 years ago
- Resources, tools and utilities about Threat Intelligence☆91Mar 18, 2023Updated 3 years ago