blackberry / threat-research-and-intelligence
BlackBerry Threat Research & Intelligence
☆90Updated 10 months ago
Related projects: ⓘ
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆113Updated 9 months ago
- The Threat Actor Profile Guide for CTI Analysts☆89Updated last year
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆69Updated this week
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆65Updated last month
- Intelligence Architecture Mind Map☆110Updated 6 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆74Updated 3 weeks ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 2 years ago
- Repository of public reference frameworks for the DFIR community.☆105Updated last year
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆84Updated last year
- User Feedback Space of #MitreAssistant☆37Updated last year
- Cyber Underground General Intelligence Requirements☆85Updated 7 months ago
- Harness the power of Splunk for your investigations☆66Updated last month
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆68Updated 9 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 3 months ago
- CarbonBlack EDR detection rules and response actions☆70Updated last week
- Full of public notes and Utilities☆81Updated 3 weeks ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆108Updated 5 months ago
- A collection of tips for using MISP.☆74Updated 5 months ago
- ☆84Updated 3 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆86Updated 7 months ago
- A repository to share publicly available Velociraptor detection content☆115Updated this week
- Active C&C Detector☆148Updated 11 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆62Updated 2 years ago
- C2 Active Scanner☆45Updated 3 months ago
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆62Updated last year
- ☆79Updated 3 weeks ago
- This repo is where I store my Threat Hunting ideas/content☆85Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆192Updated 2 years ago
- A repository of my own Sigma detection rules.☆155Updated last week