cogsec-collaborative / AMITTLinks
AMITT (Adversarial Misinformation and Influence Tactics and Techniques) framework for describing disinformation incidents. Includes TTPs and countermeasures.
☆240Updated 3 years ago
Alternatives and similar repositories for AMITT
Users that are interested in AMITT are comparing it to the libraries listed below
Sorting:
- Master copies of the DISARM frameworks, with generated files to help you explore the data☆251Updated 5 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆177Updated this week
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆119Updated this week
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆166Updated last year
- Cyber Underground General Intelligence Requirements☆96Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆114Updated 2 years ago
- Intelligence Architecture Mind Map☆136Updated last year
- Tool to build and export timelines☆36Updated last year
- Ransomware leak site monitoring☆314Updated 3 years ago
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆52Updated 5 years ago
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆564Updated last month
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆123Updated last year
- A list of books suggested by the security community to aid intelligence analysts learn to think☆28Updated 2 years ago
- Resources, tools and utilities about Threat Intelligence☆73Updated 2 years ago
- MISP Playbooks☆208Updated 3 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆98Updated last year
- ☆135Updated last year
- ☆532Updated last week
- A tool for mapping cyber crime☆152Updated 5 months ago
- an awesome list of active defense resources☆125Updated 5 years ago
- An application to analyze the EML file☆294Updated last week
- ☆259Updated 3 weeks ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆85Updated 3 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 4 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆106Updated 10 months ago
- Knowledge base on cybercriminal concealment techniques☆76Updated 4 months ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆204Updated 4 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago