Cyber Threat Intelligence
☆78Dec 7, 2025Updated 3 months ago
Alternatives and similar repositories for CTI
Users that are interested in CTI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Jun 25, 2025Updated 8 months ago
- ☆32Aug 16, 2025Updated 7 months ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 6 months ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Feb 26, 2026Updated 3 weeks ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated last year
- The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World☆163Dec 31, 2025Updated 2 months ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 4 months ago
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- ☆19Aug 6, 2021Updated 4 years ago
- Living off the False Positive!☆42Jan 31, 2025Updated last year
- CABTA (Blue Team Assistant) - AI-Powered SOC Platform for Threat Analysis, IOC Investigation & Email Forensics☆51Updated this week
- Splunk TA for alert action to TheHive-project☆11May 13, 2020Updated 5 years ago
- Yara station is a management portal for Neo23x0-Loki. The mission is to transform the standalone nature of the Loki scanner into a centra…☆34Feb 1, 2022Updated 4 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- Automatic Microsoft Sentinel Deployment☆16Apr 1, 2025Updated 11 months ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆157Mar 5, 2026Updated 2 weeks ago
- Splunk Add-on for PowerShell provides field extraction for PowerShell event logs.☆17Feb 1, 2021Updated 5 years ago
- ☆42Sep 16, 2022Updated 3 years ago
- ☆25Jul 12, 2023Updated 2 years ago
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆33Apr 1, 2024Updated last year
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆35Mar 18, 2026Updated last week
- TCP over DNS tunnel b[l]ind written in go.☆16Dec 22, 2024Updated last year
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆22Jun 6, 2017Updated 8 years ago
- A Python-based tool that monitors dark web sources for mentions of specific organizations for Threat Monitoring.☆25Apr 7, 2025Updated 11 months ago
- Enrich your investigations on IPs, Domains etc. with OSINT☆60Apr 4, 2024Updated last year
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆115May 18, 2020Updated 5 years ago
- ☆96Jan 7, 2026Updated 2 months ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Dec 31, 2018Updated 7 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Feb 2, 2025Updated last year
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- Validates Sigma rules using the JSON schema☆22Mar 18, 2024Updated 2 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Cowrie Honeypot Obscurer☆18Oct 14, 2020Updated 5 years ago
- A curated list of awesome threat detection and hunting resources☆20Apr 13, 2019Updated 6 years ago