govcert-ch / CTILinks
Random Cyber Threat Intelligence
☆48Updated 8 months ago
Alternatives and similar repositories for CTI
Users that are interested in CTI are comparing it to the libraries listed below
Sorting:
- Docker image for MISP☆134Updated 2 months ago
- A production ready Dockered MISP☆285Updated last week
- LotL RMM☆248Updated last week
- 🏴☠️💰 Another Ransomware gang tracker☆261Updated last month
- Map tracking ransomware, by OCD World Watch team☆473Updated 7 months ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆376Updated last week
- Indicators of Compromise☆221Updated this week
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆233Updated this week
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆267Updated 6 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆276Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆714Updated 8 months ago
- DFIQ is a collection of investigative questions and the approaches for answering them☆292Updated 8 months ago
- Open Source Security Operations Center Documentation☆195Updated 3 months ago
- MISP Playbooks☆211Updated 3 months ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆90Updated last week
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆199Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆391Updated 2 weeks ago
- ☆161Updated last year
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆264Updated 3 months ago
- Awesome Incident Response☆281Updated 2 weeks ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆123Updated last year
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆149Updated last week
- ☆95Updated last week
- List of past and future infosec related events.☆162Updated this week
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆380Updated last week
- This repository contains Community and Field contributed content for LogScale☆282Updated this week
- Zeek-Formatted Threat Intelligence Feeds☆378Updated this week
- Automated YARA Rule Standardization and Quality Assurance Tool☆247Updated this week
- MISP to Sentinel integration☆74Updated last week
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆144Updated last week