govcert-ch / CTI
Random Cyber Threat Intelligence
β28Updated last month
Alternatives and similar repositories for CTI:
Users that are interested in CTI are comparing it to the libraries listed below
- β36Updated 10 months ago
- LotL RMMβ113Updated 2 months ago
- π΄ββ οΈπ° Another Ransomware gang trackerβ171Updated this week
- A production ready Dockered MISPβ190Updated this week
- MISP Playbooksβ182Updated last month
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat inβ¦β219Updated this week
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains β¦β103Updated this week
- Docker image for MISPβ121Updated this week
- Cyber Underground General Intelligence Requirementsβ89Updated 11 months ago
- TRACE is a digital forensic analysis tool that provides a user-friendly interface for investigating disk images.β150Updated 2 months ago
- Indicators of Compromiseβ174Updated last month
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.β191Updated 6 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reporβ¦β214Updated last year
- Map tracking ransomware, by OCD World Watch teamβ422Updated 3 months ago
- Building a consolidated RSS feed for articles about cyberattacksβ63Updated this week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlβ¦β184Updated this week
- Open Source Platform for storing, organizing, and searching documents related to cyber threatsβ159Updated last year
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPEβ108Updated this week
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indiβ¦β100Updated 3 months ago
- Repository of attack and defensive information for Business Email Compromise investigationsβ237Updated last month
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contrβ¦β175Updated 3 weeks ago
- A collection of companies that disclose adversary TTPs after they have been breachedβ243Updated 8 months ago
- β157Updated 3 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.β151Updated 7 months ago
- Forensics Wiki, a wiki devoted to information about digital forensics (also known as computer forensics)β259Updated 8 months ago
- Rules generated from our investigations.β188Updated 2 months ago
- BlackBerry Threat Research & Intelligenceβ96Updated last year
- Windows Forensics Environment Builderβ124Updated 2 weeks ago
- Intelligence Architecture Mind Mapβ121Updated 10 months ago
- The official repo for a project involving a crowdsourced DFIR book. The main purpose of this book is to give anyone interested an opportuβ¦β197Updated 8 months ago