cogsec-collaborative / AMITTLinks
AMITT (Adversarial Misinformation and Influence Tactics and Techniques) framework for describing disinformation incidents. Includes TTPs and countermeasures.
☆241Updated 3 years ago
Alternatives and similar repositories for AMITT
Users that are interested in AMITT are comparing it to the libraries listed below
Sorting:
- Master copies of the DISARM frameworks, with generated files to help you explore the data☆264Updated last week
- Collection of Jupyter Notebooks by @fr0gger_☆191Updated last month
- Intelligence Architecture Mind Map☆143Updated last year
- Ransomware leak site monitoring☆314Updated 3 years ago
- Cyber Underground General Intelligence Requirements☆97Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆146Updated 2 months ago
- Resources, tools and utilities about Threat Intelligence☆81Updated 2 years ago
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆590Updated 2 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago
- A tool designed to hunt for Phishing Kit source code☆229Updated last week
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆127Updated this week
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆50Updated 5 years ago
- A curated list of Awesome Threat Intelligence Blogs☆487Updated 2 weeks ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆169Updated 2 years ago
- An application to analyze the EML file☆335Updated last week
- The Threat Actor Profile Guide for CTI Analysts☆116Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Updated 2 years ago
- Extract and Visualize Data from URLs using Unfurl☆709Updated last week
- an awesome list of active defense resources☆128Updated 5 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆222Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Updated 2 years ago
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆104Updated last month
- A curated list of Awesome Threat Intelligence resources☆50Updated 7 years ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Updated 3 years ago
- The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World☆155Updated last month
- A list of books suggested by the security community to aid intelligence analysts learn to think☆28Updated 2 years ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆33Updated 2 weeks ago
- ☆285Updated 5 months ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆147Updated last week
- ☆542Updated 4 months ago