cogsec-collaborative / AMITTLinks
AMITT (Adversarial Misinformation and Influence Tactics and Techniques) framework for describing disinformation incidents. Includes TTPs and countermeasures.
☆240Updated 2 years ago
Alternatives and similar repositories for AMITT
Users that are interested in AMITT are comparing it to the libraries listed below
Sorting:
- Master copies of the DISARM frameworks, with generated files to help you explore the data☆246Updated 2 months ago
- ☆66Updated 5 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆170Updated this week
- Intelligence Architecture Mind Map☆132Updated last year
- A list of books suggested by the security community to aid intelligence analysts learn to think☆28Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- Dictionary of CTI-related acronyms, terms, and jargon☆142Updated last year
- Cyber Underground General Intelligence Requirements☆93Updated last year
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆113Updated this week
- A OSINT project that explores how to dump data from React☆26Updated last year
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆97Updated 3 weeks ago
- Tool to build and export timelines☆35Updated 9 months ago
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆52Updated 4 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- Your OSINT Graphical Analyzer☆231Updated 10 months ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆165Updated last year
- Repo for Concierge AI dev work☆195Updated this week
- Resources, tools and utilities about Threat Intelligence☆67Updated 2 years ago
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆177Updated last year
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆252Updated 2 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Updated 2 years ago
- A curated list of Awesome Threat Intelligence resources☆46Updated 6 years ago
- A list of my personal projects☆177Updated 2 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆112Updated 7 months ago
- A curated list of Awesome Threat Intelligence Blogs☆422Updated this week
- A list of Per-Reviewed Journals, Books and Blogs on intelligence and Cybersecurity☆23Updated last year
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆175Updated 2 years ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆143Updated last week