A curated list of Awesome Threat Intelligence Blogs
☆508Feb 16, 2026Updated 3 weeks ago
Alternatives and similar repositories for awesome_threat_intel_blogs
Users that are interested in awesome_threat_intel_blogs are comparing it to the libraries listed below
Sorting:
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆774Jan 28, 2025Updated last year
- Live Feed of C2 servers, tools, and botnets☆751Mar 2, 2026Updated last week
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆117Oct 29, 2024Updated last year
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆706Apr 21, 2025Updated 10 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆641Aug 4, 2025Updated 7 months ago
- A resource containing all the tools each ransomware gangs uses☆1,332Dec 24, 2025Updated 2 months ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Feb 27, 2026Updated last week
- A curated list of Awesome Threat Intelligence blogs☆104Jul 8, 2023Updated 2 years ago
- Awesome Security lists for SOC/CERT/CTI☆1,271Updated this week
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,636Updated this week
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆772Feb 8, 2026Updated last month
- AIL framework - Analysis Information Leak framework☆885Mar 2, 2026Updated last week
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆169Nov 10, 2023Updated 2 years ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,517Jan 5, 2026Updated 2 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆282Mar 20, 2025Updated 11 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆202Jul 3, 2024Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆128Apr 6, 2024Updated last year
- Turn any blog into structured threat intelligence.☆52Updated this week
- A curated list of Awesome Threat Intelligence resources☆9,872Jan 19, 2026Updated last month
- A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 D…☆758Aug 28, 2025Updated 6 months ago
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,635Feb 23, 2026Updated 2 weeks ago
- MISP Playbooks☆222Oct 14, 2025Updated 4 months ago
- Interesting APT Report Collection And Some Special IOCs☆2,929Updated this week
- Yet another Ransomware gang tracker☆563Feb 24, 2026Updated last week
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆594Dec 4, 2025Updated 3 months ago
- Automatically created C2 Feeds☆667Updated this week
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Feb 13, 2026Updated 3 weeks ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆551May 6, 2025Updated 10 months ago
- The Threat Actor Profile Guide for CTI Analysts☆116Jul 15, 2023Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆193Dec 20, 2024Updated last year
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,633Mar 1, 2026Updated last week
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆1,061Oct 5, 2023Updated 2 years ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,303Jun 1, 2023Updated 2 years ago
- Mapping of open-source detection rules and atomic tests.☆202Feb 16, 2026Updated 3 weeks ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Nov 11, 2025Updated 3 months ago
- A curated list of annual cyber security reports☆1,018Updated this week
- Your Everyday Threat Intelligence☆1,954Feb 12, 2026Updated 3 weeks ago