P3t3rp4rk3r / Threat_IntelligenceLinks
Threat-Intelligence Feeds & Tools & Frameworks
☆217Updated last year
Alternatives and similar repositories for Threat_Intelligence
Users that are interested in Threat_Intelligence are comparing it to the libraries listed below
Sorting:
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆246Updated 3 years ago
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- Splunk code (SPL) for serious threat hunters and detection engineers.☆280Updated last year
- Resources for SANS CTI Summit 2021 presentation☆103Updated last year
- This is a repository for freq.py and freq_server.py☆208Updated 4 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆142Updated last year
- ☆116Updated last year
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆110Updated 5 years ago
- Collecting & Hunting for IOCs with gusto and style☆238Updated 3 years ago
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- Zeek-Formatted Threat Intelligence Feeds☆367Updated this week
- User guide of MISP☆268Updated 5 months ago
- Dump of organized knowledge on DFIR☆134Updated 3 years ago
- DFIRTrack - The Incident Response Tracking Application☆499Updated 9 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆151Updated 2 months ago
- A curated list of awesome things related to TheHive & Cortex☆180Updated 3 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆87Updated last year
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆185Updated 3 years ago
- Sigma rules from Joe Security☆215Updated 7 months ago
- Awesome VirusTotal Intelligence Search Queries☆332Updated 2 years ago
- an awesome list of active defense resources☆121Updated 4 years ago
- MISP trainings, threat intel and information sharing training materials with source code☆409Updated last week
- A Splunk app to use MISP in background☆110Updated last week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆216Updated 2 months ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆165Updated last year
- Collection of created MindMaps☆150Updated last year
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆177Updated 11 months ago
- ☆173Updated 11 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago