AMITT (Adversarial Misinformation and Influence Tactics and Techniques) framework for describing disinformation incidents. Includes TTPs and countermeasures.
☆243Jul 3, 2022Updated 3 years ago
Alternatives and similar repositories for AMITT
Users that are interested in AMITT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Master copies of the DISARM frameworks, with generated files to help you explore the data☆269Mar 28, 2026Updated last month
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- Links to resources on misinformation, disinformation, fake news, whatever it's called this week☆52Feb 24, 2022Updated 4 years ago
- ☆69Feb 5, 2020Updated 6 years ago
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Jul 12, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CIB Analysis Data☆20May 10, 2020Updated 6 years ago
- The Threat Actor Profile Guide for CTI Analysts☆120Jul 15, 2023Updated 2 years ago
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Dec 9, 2019Updated 6 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- A Flask application for analyzing activity on an online discussion forum, using scraping, indexing, analytics, relational graph and NLP.☆11Nov 24, 2020Updated 5 years ago
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆21Mar 24, 2022Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆61Mar 2, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- 🗞 Monitors data sources, alerts you when they change☆13Jul 23, 2021Updated 4 years ago
- Configuration Extractor for BlackCat Ransomware☆29Mar 18, 2022Updated 4 years ago
- ☆16May 15, 2021Updated 5 years ago
- Allow exploration and conservation of political ads archives☆11Apr 27, 2022Updated 4 years ago
- ☆27Mar 2, 2022Updated 4 years ago
- Resources for SANS CTI Summit 2021 presentation☆104Nov 8, 2023Updated 2 years ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆54Jun 21, 2025Updated 11 months ago
- Social Network Analysis of Disinformation, Platforms, Freelancing around Amber Heard, Johnny Depp, Elon Musk - Twitter, Reddit, YouTube, …☆62Jun 29, 2025Updated 10 months ago
- Persistent twitter monitor tool for 2021 SANS OSINT Summit Talk☆18Mar 3, 2022Updated 4 years ago
- ☆100Feb 16, 2021Updated 5 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- iVerify Apps: Apps that support the AI-powered iVerify platform to combat misinformation and hate speech☆32Apr 6, 2026Updated last month
- A knowledge base of actionable Incident Response techniques☆665May 31, 2022Updated 3 years ago
- This windows CLI app lets you collect data from twitter via REST API and convert it into a CSV data set that can be used with Gephi. Othe…☆25Oct 26, 2020Updated 5 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆100Feb 19, 2024Updated 2 years ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 5 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆101Feb 2, 2024Updated 2 years ago
- Repository of public reference frameworks for the DFIR community.☆122Jul 4, 2023Updated 2 years ago