P3t3rp4rk3r / Threat_Intelligence
Threat-Intelligence Feeds & Tools & Frameworks
☆215Updated 11 months ago
Alternatives and similar repositories for Threat_Intelligence
Users that are interested in Threat_Intelligence are comparing it to the libraries listed below
Sorting:
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆246Updated 3 years ago
- Collecting & Hunting for IOCs with gusto and style☆238Updated 3 years ago
- Collection of created MindMaps☆150Updated last year
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆165Updated last year
- MISP trainings, threat intel and information sharing training materials with source code☆407Updated last week
- Splunk code (SPL) for serious threat hunters and detection engineers.☆276Updated last year
- ☆172Updated 10 months ago
- ☆116Updated last year
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- User guide of MISP☆267Updated 4 months ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆110Updated 5 years ago
- Zeek-Formatted Threat Intelligence Feeds☆361Updated this week
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆185Updated 3 years ago
- A curated list of awesome things related to TheHive & Cortex☆179Updated 3 years ago
- The Threat Actor Profile Guide for CTI Analysts☆106Updated last year
- ☆201Updated last year
- Dump of organized knowledge on DFIR☆134Updated 3 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 2 years ago
- DFIRTrack - The Incident Response Tracking Application☆498Updated 8 months ago
- an awesome list of active defense resources☆120Updated 4 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆212Updated last month
- Awesome VirusTotal Intelligence Search Queries☆332Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- SIEGMA - Transform Sigma rules into SIEM consumables☆150Updated 2 months ago
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆176Updated 10 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- CASCADE Server☆269Updated 2 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆142Updated last year