AMITT (Adversarial Misinformation and Influence Tactics and Techniques) framework for describing disinformation incidents. Includes TTPs and countermeasures.
☆243Jul 3, 2022Updated 3 years ago
Alternatives and similar repositories for AMITT
Users that are interested in AMITT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Links to resources on misinformation, disinformation, fake news, whatever it's called this week☆52Feb 24, 2022Updated 4 years ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- ☆68Feb 5, 2020Updated 6 years ago
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Jul 12, 2021Updated 4 years ago
- CIB Analysis Data☆20May 10, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- The Threat Actor Profile Guide for CTI Analysts☆117Jul 15, 2023Updated 2 years ago
- Repo replaced by cogsec-collaborative/AMITT☆11Dec 13, 2020Updated 5 years ago
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Dec 9, 2019Updated 6 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- A Flask application for analyzing activity on an online discussion forum, using scraping, indexing, analytics, relational graph and NLP.☆11Nov 24, 2020Updated 5 years ago
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆20Mar 24, 2022Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆57Mar 2, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- 🗞 Monitors data sources, alerts you when they change☆13Jul 23, 2021Updated 4 years ago
- Configuration Extractor for BlackCat Ransomware☆31Mar 18, 2022Updated 4 years ago
- ☆16May 15, 2021Updated 4 years ago
- Allow exploration and conservation of political ads archives☆11Apr 27, 2022Updated 3 years ago
- ☆27Mar 2, 2022Updated 4 years ago
- Resources for SANS CTI Summit 2021 presentation☆104Nov 8, 2023Updated 2 years ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 4 years ago
- Social Network Analysis of Disinformation, Platforms, Freelancing around Amber Heard, Johnny Depp, Elon Musk - Twitter, Reddit, YouTube, …☆61Jun 29, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆52Jun 21, 2025Updated 9 months ago
- Persistent twitter monitor tool for 2021 SANS OSINT Summit Talk☆18Mar 3, 2022Updated 4 years ago
- ☆100Feb 16, 2021Updated 5 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- iVerify Apps: Apps that support the AI-powered iVerify platform to combat misinformation and hate speech☆31Updated this week
- A knowledge base of actionable Incident Response techniques☆665May 31, 2022Updated 3 years ago
- This windows CLI app lets you collect data from twitter via REST API and convert it into a CSV data set that can be used with Gephi. Othe…☆25Oct 26, 2020Updated 5 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆98Feb 19, 2024Updated 2 years ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 4 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- Repository of public reference frameworks for the DFIR community.☆122Jul 4, 2023Updated 2 years ago