govcert-ch / CTILinks
Random Cyber Threat Intelligence
☆48Updated 9 months ago
Alternatives and similar repositories for CTI
Users that are interested in CTI are comparing it to the libraries listed below
Sorting:
- A production ready Dockered MISP☆289Updated last week
- Docker image for MISP☆135Updated 2 months ago
- Indicators of Compromise☆227Updated last week
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆384Updated this week
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆235Updated 3 weeks ago
- 🏴☠️💰 Another Ransomware gang tracker☆263Updated last month
- Map tracking ransomware, by OCD World Watch team☆477Updated 7 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆717Updated 9 months ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆394Updated this week
- LotL RMM☆250Updated this week
- Zeek-Formatted Threat Intelligence Feeds☆378Updated this week
- Open Source Security Operations Center Documentation☆198Updated 4 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆269Updated 7 months ago
- ☆162Updated last year
- Cyber Incident Response Team Playbook Battle Cards☆419Updated last year
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆484Updated last week
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆304Updated this week
- Standard-Format Threat Intelligence Feeds☆124Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆436Updated this week
- MISP Playbooks☆215Updated 2 weeks ago
- A website and framework for testing NIDS detection☆292Updated 3 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆281Updated last week
- Awesome Incident Response☆283Updated last month
- This repository contains Community and Field contributed content for LogScale☆292Updated this week
- List of past and future infosec related events.☆165Updated this week
- DFIQ is a collection of investigative questions and the approaches for answering them☆294Updated 9 months ago
- Documentation and scripts to properly enable Windows event logs.☆638Updated 3 weeks ago
- Suspicious is a powerful web application designed to help users submit and analyze emails, files, IP addresses, and URLs☆66Updated this week
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆167Updated last year
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆199Updated last year