cogsec-collaborative / AMITTLinks
AMITT (Adversarial Misinformation and Influence Tactics and Techniques) framework for describing disinformation incidents. Includes TTPs and countermeasures.
☆241Updated 3 years ago
Alternatives and similar repositories for AMITT
Users that are interested in AMITT are comparing it to the libraries listed below
Sorting:
- Master copies of the DISARM frameworks, with generated files to help you explore the data☆263Updated 10 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆191Updated last month
- Intelligence Architecture Mind Map☆141Updated last year
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆50Updated 5 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆146Updated 2 months ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆126Updated last week
- Resources, tools and utilities about Threat Intelligence☆79Updated 2 years ago
- Ransomware leak site monitoring☆315Updated 3 years ago
- Cyber Underground General Intelligence Requirements☆97Updated last year
- A tool designed to hunt for Phishing Kit source code☆229Updated 2 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆169Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆116Updated 2 years ago
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆589Updated last month
- Tool to build and export timelines☆34Updated last year
- ☆284Updated 5 months ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Updated 3 years ago
- Threat Intel Platform for T-POTs☆162Updated this week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Updated 2 years ago
- A list of books suggested by the security community to aid intelligence analysts learn to think☆28Updated 2 years ago
- The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World☆147Updated 3 weeks ago
- ☆67Updated 5 years ago
- A curated list of Awesome Threat Intelligence Blogs☆487Updated last week
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆42Updated last week
- A curated list of Awesome Threat Intelligence resources☆50Updated 7 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆222Updated last year
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆93Updated this week
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆31Updated last week
- An application to analyze the EML file☆334Updated this week