intel471 / CU-GIR
Cyber Underground General Intelligence Requirements
☆85Updated 7 months ago
Related projects: ⓘ
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆113Updated 9 months ago
- The Threat Actor Profile Guide for CTI Analysts☆89Updated last year
- User Feedback Space of #MitreAssistant☆37Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆68Updated 9 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆93Updated 6 months ago
- CarbonBlack EDR detection rules and response actions☆70Updated last week
- Intel Retrieval Augmented Generation (RAG) Utilities☆86Updated 7 months ago
- BlackBerry Threat Research & Intelligence☆90Updated 10 months ago
- Intelligence Architecture Mind Map☆110Updated 6 months ago
- Repository of public reference frameworks for the DFIR community.☆105Updated last year
- ☆23Updated this week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆108Updated 5 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆74Updated 3 weeks ago
- Harness the power of Splunk for your investigations☆66Updated last month
- C2 Active Scanner☆45Updated 3 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 2 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 3 months ago
- Config files for my GitHub profile.☆15Updated last year
- ☆79Updated 3 weeks ago
- An opensource sigma conversion tool built using pysigma☆90Updated last week
- Building a consolidated RSS feed for articles about cyberattacks☆54Updated this week
- Script to automate Linux live evidence collection☆27Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆47Updated 2 weeks ago
- Forensic Artifact Collection Tool Matrix☆70Updated 2 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆176Updated 2 months ago
- MISP Playbooks☆167Updated 3 weeks ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 4 months ago
- Full of public notes and Utilities☆81Updated 3 weeks ago
- Linux Baseline and Forensic Triage Tool - BETA☆51Updated 2 years ago