A list of Per-Reviewed Journals, Books and Blogs on intelligence and Cybersecurity
☆25Apr 1, 2024Updated last year
Alternatives and similar repositories for Intelligence-and-Cybersecurity-Peer-Reviewed-sources
Users that are interested in Intelligence-and-Cybersecurity-Peer-Reviewed-sources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Intelligence Architecture Mind Map☆145Mar 15, 2024Updated 2 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Dec 13, 2023Updated 2 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 7 months ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 6 months ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Aug 24, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- OASIS OpenC2 TC: GitHub repository used to propose and track changes to the OpenC2 Language Specification as new working draft level revi…☆17May 9, 2024Updated last year
- OCA-wide documentation shared by all sub-projects and repositories☆33Oct 31, 2024Updated last year
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- ☆13Jul 12, 2025Updated 8 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆117Oct 29, 2024Updated last year
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆117Jul 15, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Python bindings for Yeti's API☆19Sep 12, 2023Updated 2 years ago
- ☆19Feb 14, 2025Updated last year
- NC3 Jule CTF 2018☆12Oct 10, 2019Updated 6 years ago
- JSON schemas for validating CACAO Security Playbooks. Note: In December 2023, Cyentific AS offered and transferred the content of this re…☆19Dec 15, 2023Updated 2 years ago
- Passive DNS Common Output Format☆37Aug 30, 2024Updated last year
- Species classification on images of flowers☆18Nov 6, 2019Updated 6 years ago
- Chapter 9: Disseminate☆16Sep 6, 2017Updated 8 years ago
- ☆19Nov 23, 2022Updated 3 years ago
- OASIS OpenC2 TC: Repository for submitting and reviewing OpenC2 use cases relevant to the work of the OpenC2 Language Subcommittee (LSC)☆30Apr 20, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- STIX 2.1 Data Modeling Tool☆27Jul 2, 2024Updated last year
- Open platform for modelling, collection and exchange of knowledge☆165May 9, 2025Updated 10 months ago
- #YOLO motherfuckers!☆22Jan 16, 2018Updated 8 years ago
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆32Jan 16, 2024Updated 2 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- Powering Hardware, Radio, Web, and IoT Security Assessments Trilokya OS is a powerful, security-focused operating system designed for pen…☆22Mar 4, 2026Updated 3 weeks ago
- This list of tools is meant to act as a staple resource for Small to Medium businesses. We understand the hardship of not being able to a…☆49May 15, 2020Updated 5 years ago
- A CTF challenge generator.☆11Nov 29, 2023Updated 2 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆30Mar 3, 2021Updated 5 years ago
- Bash script installing the latest version of Greenbone Community Edition the artist formerly known as OpenVAS. Greenbone Community Editio…☆23Updated this week
- A web application for generating, parsing and validating, manipulating, visualizing and executing CACAO v2.0 playbooks.☆39Aug 27, 2025Updated 7 months ago
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆598Dec 4, 2025Updated 3 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Resources for SANS CTI Summit 2021 presentation☆104Nov 8, 2023Updated 2 years ago
- Matt's DFIR blog☆14Jul 28, 2025Updated 8 months ago