P3t3rp4rk3r / Threat_IntelligenceLinks
Threat-Intelligence Feeds & Tools & Frameworks
☆220Updated last year
Alternatives and similar repositories for Threat_Intelligence
Users that are interested in Threat_Intelligence are comparing it to the libraries listed below
Sorting:
- Collection of created MindMaps☆151Updated last year
- Awesome VirusTotal Intelligence Search Queries☆333Updated 2 years ago
- Resources for SANS CTI Summit 2021 presentation☆103Updated last year
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆189Updated 3 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year
- Collecting & Hunting for IOCs with gusto and style☆241Updated 4 years ago
- ☆116Updated last year
- Repository of public reference frameworks for the DFIR community.☆119Updated 2 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆110Updated 5 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆166Updated last year
- ☆175Updated last year
- Dump of organized knowledge on DFIR☆135Updated 4 years ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆178Updated last year
- A curated list of awesome things related to TheHive & Cortex☆183Updated 4 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆105Updated last year
- User guide of MISP☆276Updated 9 months ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆92Updated last year
- ☆78Updated 5 years ago
- Open platform for modelling, collection and exchange of knowledge☆162Updated 5 months ago
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆203Updated 2 years ago
- Cybersecurity Incident Response Plan☆105Updated 5 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆248Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- A curated list of Awesome Threat Intelligence resources☆48Updated 7 years ago
- Three datasets to practice Threat Hunting against.☆46Updated last year
- Zeek-Formatted Threat Intelligence Feeds☆377Updated this week
- ☆53Updated 3 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆123Updated last year
- A tool designed to hunt for Phishing Kit source code☆224Updated 2 years ago