cogsec-collaborative / AMITTLinks
AMITT (Adversarial Misinformation and Influence Tactics and Techniques) framework for describing disinformation incidents. Includes TTPs and countermeasures.
☆240Updated 3 years ago
Alternatives and similar repositories for AMITT
Users that are interested in AMITT are comparing it to the libraries listed below
Sorting:
- Master copies of the DISARM frameworks, with generated files to help you explore the data☆252Updated 6 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆178Updated last week
- Intelligence Architecture Mind Map☆136Updated last year
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆567Updated last month
- Ransomware leak site monitoring☆316Updated 3 years ago
- ☆260Updated last month
- Resources, tools and utilities about Threat Intelligence☆74Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆120Updated last week
- The Threat Actor Profile Guide for CTI Analysts☆114Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆123Updated last year
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆52Updated 5 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year
- Cyber Underground General Intelligence Requirements☆96Updated last year
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- A curated list of Awesome Threat Intelligence Blogs☆452Updated 2 months ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆175Updated 2 years ago
- A list of books suggested by the security community to aid intelligence analysts learn to think☆28Updated 2 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆100Updated last year
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆27Updated this week
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆166Updated last year
- A tool designed to hunt for Phishing Kit source code☆224Updated 2 years ago
- An application to analyze the EML file☆293Updated 3 weeks ago
- Threat Intel Platform for T-POTs☆159Updated this week
- A curated list of Awesome Threat Intelligence resources☆48Updated 7 years ago
- an awesome list of active defense resources☆126Updated 5 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆220Updated last year
- Tool to build and export timelines☆36Updated last year
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆91Updated this week
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Updated 3 years ago
- A tool for mapping cyber crime☆154Updated 5 months ago