The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World
☆167Apr 11, 2026Updated last week
Alternatives and similar repositories for the-art-of-pivoting
Users that are interested in the-art-of-pivoting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 4 months ago
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆30Aug 4, 2025Updated 8 months ago
- Incident Response automation scripts☆16Sep 5, 2025Updated 7 months ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆30Mar 3, 2021Updated 5 years ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 11 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Apr 9, 2025Updated last year
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆40Jul 4, 2025Updated 9 months ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆12Apr 13, 2026Updated last week
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 11 months ago
- ☆23Mar 17, 2024Updated 2 years ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- ☆109Dec 9, 2025Updated 4 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Jun 25, 2025Updated 9 months ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆36Jan 8, 2026Updated 3 months ago
- Hunt the windows Registry automatically using VQL☆15Jan 6, 2026Updated 3 months ago
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆56Sep 24, 2025Updated 6 months ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆92Aug 3, 2025Updated 8 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 7 months ago
- AI-Powered Threat Intelligence MCP tool☆36Jul 18, 2025Updated 9 months ago
- Automatically created C2 Feeds☆670Updated this week
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆37Oct 21, 2025Updated 5 months ago
- Yara rules☆22Mar 27, 2023Updated 3 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆118Oct 29, 2024Updated last year
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆18Mar 21, 2025Updated last year
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- ☆28Feb 14, 2018Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- a scaling framework for tor traffic balancing 🧦 🧅 ⚖️☆14Mar 21, 2026Updated 3 weeks ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 2 months ago
- AIL project training materials☆39Feb 24, 2026Updated last month
- A scanner for taking basic fingerprints☆50Oct 1, 2020Updated 5 years ago
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆121Oct 8, 2023Updated 2 years ago
- Open Source eBPF Malware Analysis Framework☆54Oct 20, 2024Updated last year