The Threat Actor Profile Guide for CTI Analysts
☆119Jul 15, 2023Updated 2 years ago
Alternatives and similar repositories for Threat-Actor-Profile-Guide
Users that are interested in Threat-Actor-Profile-Guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆715Apr 21, 2025Updated 11 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆203Jul 3, 2024Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆118Oct 29, 2024Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆287Mar 20, 2025Updated last year
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆785Feb 8, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆104Dec 13, 2023Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆170Nov 10, 2023Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Oct 22, 2021Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆46Apr 25, 2024Updated last year
- A repository for tracking events related to the MOVEit Transfer Cl0p Campaign☆71Jul 19, 2023Updated 2 years ago
- Practice CTI Quiz☆13Mar 20, 2024Updated 2 years ago
- A resource containing all the tools each ransomware gangs uses☆1,344Apr 1, 2026Updated 2 weeks ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆196Dec 20, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Jun 4, 2022Updated 3 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Mar 14, 2026Updated last month
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- A collection of methods to learn who the owner of an IP address is.☆230Sep 29, 2025Updated 6 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆821Updated this week
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Sep 27, 2022Updated 3 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆195Dec 16, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆57Updated this week
- A list of books suggested by the security community to aid intelligence analysts learn to think☆27Aug 7, 2023Updated 2 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Sep 16, 2023Updated 2 years ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆55Jul 31, 2022Updated 3 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆148Nov 27, 2025Updated 4 months ago
- Resources for SANS CTI Summit 2021 presentation☆104Nov 8, 2023Updated 2 years ago
- Live Feed of C2 servers, tools, and botnets☆772Updated this week
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,304Jun 1, 2023Updated 2 years ago
- A collection of CVEs weaponized by ransomware operators☆129Oct 13, 2025Updated 6 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- Sigma rules to share with the community☆124Jan 29, 2025Updated last year
- Resources, tools and utilities about Threat Intelligence☆88Mar 18, 2023Updated 3 years ago
- A list of Per-Reviewed Journals, Books and Blogs on intelligence and Cybersecurity☆25Apr 1, 2024Updated 2 years ago
- Intelligence Architecture Mind Map☆145Mar 15, 2024Updated 2 years ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆61Sep 18, 2025Updated 7 months ago