govcert-ch / CTI
Random Cyber Threat Intelligence
☆43Updated 3 weeks ago
Alternatives and similar repositories for CTI:
Users that are interested in CTI are comparing it to the libraries listed below
- A production ready Dockered MISP☆204Updated this week
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆237Updated this week
- 🏴☠️💰 Another Ransomware gang tracker☆177Updated this week
- Docker image for MISP☆122Updated last month
- Map tracking ransomware, by OCD World Watch team☆425Updated 5 months ago
- Docker image for Velocidex Velociraptor☆118Updated 7 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆637Updated 3 weeks ago
- ☆40Updated last month
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆224Updated last year
- Repository of attack and defensive information for Business Email Compromise investigations☆246Updated 3 weeks ago
- DFIQ is a collection of investigative questions and the approaches for answering them☆271Updated last month
- Indicators of Compromise☆182Updated 3 weeks ago
- Rules generated from our investigations.☆193Updated 3 months ago
- MISP Playbooks☆184Updated last week
- Zeek-Formatted Threat Intelligence Feeds☆352Updated this week
- Repository of SentinelOne Deep Visibility queries.☆122Updated 3 years ago
- LotL RMM☆128Updated last week
- Forensic Artifact Collection Tool Matrix☆82Updated 3 months ago
- Harness the power of Splunk for your investigations☆88Updated 2 months ago
- Building a consolidated RSS feed for articles about cyberattacks☆65Updated this week
- Automated YARA Rule Standardization and Quality Assurance Tool☆192Updated last week
- Powershell module for VMWare vSphere forensics☆149Updated 3 months ago
- Documentation and scripts to properly enable Windows event logs.☆588Updated last year
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆194Updated 7 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆522Updated this week
- SentinelOne STAR Rules☆56Updated last week
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆162Updated last year
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆183Updated this week
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆151Updated 9 months ago
- Cyber Incident Response Team Playbook Battle Cards☆370Updated 9 months ago