AMITT (Adversarial Misinformation and Influence Tactics and Techniques) framework for describing disinformation incidents. Includes TTPs and countermeasures.
☆242Jul 3, 2022Updated 3 years ago
Alternatives and similar repositories for AMITT
Users that are interested in AMITT are comparing it to the libraries listed below
Sorting:
- Master copies of the DISARM frameworks, with generated files to help you explore the data☆262Jan 29, 2026Updated last month
- Books, advice notes, and useful lists, written for people running and working on disinformation deployments☆16Mar 11, 2021Updated 4 years ago
- Links to resources on misinformation, disinformation, fake news, whatever it's called this week☆52Feb 24, 2022Updated 4 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- ☆67Feb 5, 2020Updated 6 years ago
- The Threat Actor Profile Guide for CTI Analysts☆116Jul 15, 2023Updated 2 years ago
- Configuration Extractor for BlackCat Ransomware☆31Mar 18, 2022Updated 3 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- 🗞 Monitors data sources, alerts you when they change☆13Jul 23, 2021Updated 4 years ago
- A Flask application for analyzing activity on an online discussion forum, using scraping, indexing, analytics, relational graph and NLP.☆11Nov 24, 2020Updated 5 years ago
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Dec 9, 2019Updated 6 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Repo replaced by cogsec-collaborative/AMITT☆11Dec 13, 2020Updated 5 years ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 3 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 8 years ago
- A knowledge base of actionable Incident Response techniques☆662May 31, 2022Updated 3 years ago
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Jul 12, 2021Updated 4 years ago
- Repository of public reference frameworks for the DFIR community.☆121Jul 4, 2023Updated 2 years ago
- ☆27Mar 2, 2022Updated 3 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Apr 25, 2024Updated last year
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Persistent twitter monitor tool for 2021 SANS OSINT Summit Talk☆18Mar 3, 2022Updated 3 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated 11 months ago
- CIB Analysis Data☆20May 10, 2020Updated 5 years ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆57Feb 19, 2026Updated last week
- ☆27Jul 11, 2022Updated 3 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Jun 21, 2024Updated last year
- ☆99Feb 16, 2021Updated 5 years ago