The Threat Actor Profile Guide for CTI Analysts
☆120Jul 15, 2023Updated 2 years ago
Alternatives and similar repositories for Threat-Actor-Profile-Guide
Users that are interested in Threat-Actor-Profile-Guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆720Apr 25, 2026Updated last week
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆205Jul 3, 2024Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆119Oct 29, 2024Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆288Mar 20, 2025Updated last year
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆794Feb 8, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆104Dec 13, 2023Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆100Feb 2, 2024Updated 2 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆170Nov 10, 2023Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Oct 22, 2021Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆46Apr 25, 2024Updated 2 years ago
- A repository for tracking events related to the MOVEit Transfer Cl0p Campaign☆71Jul 19, 2023Updated 2 years ago
- Practice CTI Quiz☆13Mar 20, 2024Updated 2 years ago
- A resource containing all the tools each ransomware gangs uses☆1,356Apr 1, 2026Updated last month
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆198Dec 20, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆52May 16, 2022Updated 3 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Jun 4, 2022Updated 3 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Mar 14, 2026Updated last month
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆54Oct 23, 2024Updated last year
- A collection of methods to learn who the owner of an IP address is.☆233Sep 29, 2025Updated 7 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆827Updated this week
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Sep 27, 2022Updated 3 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆195Dec 16, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆59Updated this week
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Sep 16, 2023Updated 2 years ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆55Jul 31, 2022Updated 3 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆149Nov 27, 2025Updated 5 months ago
- Resources for SANS CTI Summit 2021 presentation☆104Nov 8, 2023Updated 2 years ago
- Live Feed of C2 servers, tools, and botnets☆772Apr 13, 2026Updated 3 weeks ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,305Jun 1, 2023Updated 2 years ago
- A collection of CVEs weaponized by ransomware operators☆136Updated this week
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Sigma rules to share with the community☆125Jan 29, 2025Updated last year
- Resources, tools and utilities about Threat Intelligence☆91Mar 18, 2023Updated 3 years ago
- A list of Per-Reviewed Journals, Books and Blogs on intelligence and Cybersecurity☆26Apr 1, 2024Updated 2 years ago
- Intelligence Architecture Mind Map☆146Mar 15, 2024Updated 2 years ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆61Sep 18, 2025Updated 7 months ago
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆611Dec 4, 2025Updated 5 months ago