Intelligence Architecture Mind Map
☆145Mar 15, 2024Updated 2 years ago
Alternatives and similar repositories for IntelArchitectureMap
Users that are interested in IntelArchitectureMap are comparing it to the libraries listed below
Sorting:
- A list of Per-Reviewed Journals, Books and Blogs on intelligence and Cybersecurity☆25Apr 1, 2024Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆598Dec 4, 2025Updated 3 months ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- Converting data from services like Censys and Shodan to a common data model☆52Feb 22, 2026Updated last month
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 7 months ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆97Jan 8, 2026Updated 2 months ago
- Placeholder for IRIS-H Digital Forensics Tool☆15May 30, 2018Updated 7 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- The Threat Actor Profile Guide for CTI Analysts☆117Jul 15, 2023Updated 2 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆170Nov 10, 2023Updated 2 years ago
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- ETW forensic tool for Volatility3 plugin☆17Nov 15, 2024Updated last year
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆710Apr 21, 2025Updated 11 months ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆26Dec 1, 2022Updated 3 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Sep 16, 2023Updated 2 years ago
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Dec 13, 2023Updated 2 years ago
- Map tracking ransomware, by OCD World Watch team☆486Feb 20, 2026Updated last month
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆117Oct 29, 2024Updated last year
- ☆22Aug 29, 2024Updated last year
- ☆23May 22, 2023Updated 2 years ago
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆33Apr 1, 2024Updated last year
- Packer for demonstrating various evasion techniques☆17Jun 4, 2025Updated 9 months ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- MITRE ATT&CK Based App in Power BI☆18Feb 23, 2024Updated 2 years ago
- Public Maltego Transforms☆24May 24, 2017Updated 8 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆147Nov 27, 2025Updated 3 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆43Jan 20, 2026Updated 2 months ago
- Threat Hunting tool about Sysmon and graphs☆337May 28, 2023Updated 2 years ago
- Resources, tools and utilities about Threat Intelligence☆84Mar 18, 2023Updated 3 years ago