P3t3rp4rk3r / Threat_IntelligenceLinks
Threat-Intelligence Feeds & Tools & Frameworks
☆221Updated last year
Alternatives and similar repositories for Threat_Intelligence
Users that are interested in Threat_Intelligence are comparing it to the libraries listed below
Sorting:
- Awesome VirusTotal Intelligence Search Queries☆333Updated 2 years ago
- Collection of created MindMaps☆151Updated 2 years ago
- A curated list of awesome things related to TheHive & Cortex☆182Updated 4 years ago
- Collecting & Hunting for IOCs with gusto and style☆241Updated 4 years ago
- Resources for SANS CTI Summit 2021 presentation☆104Updated 2 years ago
- Dump of organized knowledge on DFIR☆135Updated 4 years ago
- Zeek Log Cheatsheets☆298Updated 3 months ago
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆168Updated 2 years ago
- Repository of public reference frameworks for the DFIR community.☆120Updated 2 years ago
- an awesome list of active defense resources☆126Updated 5 years ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆188Updated 3 years ago
- Threat Hunting tool about Sysmon and graphs☆333Updated 2 years ago
- ☆116Updated last year
- User guide of MISP☆280Updated 10 months ago
- A curated list of Awesome Threat Intelligence resources☆50Updated 7 years ago
- ☆175Updated last year
- Cybersecurity Incident Response Plan☆109Updated 5 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆101Updated last month
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Updated 5 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆249Updated 4 years ago
- Zeek-Formatted Threat Intelligence Feeds☆380Updated this week
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆180Updated last year
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆204Updated 2 years ago
- Intelligence Architecture Mind Map☆137Updated last year
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- Open platform for modelling, collection and exchange of knowledge☆162Updated 6 months ago