A curated list of Awesome Threat Intelligence resources
☆50Aug 9, 2018Updated 7 years ago
Alternatives and similar repositories for awesome-threat-intelligence
Users that are interested in awesome-threat-intelligence are comparing it to the libraries listed below
Sorting:
- A curated list of awesome threat detection and hunting resources☆16Sep 12, 2018Updated 7 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering …☆10Jan 23, 2019Updated 7 years ago
- Open source alternative to Burpsuite☆15May 18, 2021Updated 4 years ago
- A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.☆576Mar 24, 2023Updated 2 years ago
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- Resources for SANS CTI Summit 2021 presentation☆104Nov 8, 2023Updated 2 years ago
- A curated threat modeling library collection☆24Dec 1, 2023Updated 2 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- ☆15Aug 8, 2021Updated 4 years ago
- Collection of created MindMaps☆150Nov 14, 2023Updated 2 years ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆25Apr 30, 2025Updated 10 months ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆80Jul 29, 2022Updated 3 years ago
- Scripts for AWS amusement...☆21May 3, 2022Updated 3 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Mar 7, 2023Updated 3 years ago
- Just a bunch of useful links to take (and pass!) OSCP☆19May 18, 2020Updated 5 years ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆20Jan 24, 2021Updated 5 years ago
- PCNSE Study Guide Notes☆13Dec 24, 2020Updated 5 years ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆496Apr 3, 2024Updated last year
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Feb 19, 2018Updated 8 years ago
- ☆24Apr 16, 2019Updated 6 years ago
- Security, Compliance and Informational Dashboard System☆25May 12, 2021Updated 4 years ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 7 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- ☆19Mar 23, 2021Updated 4 years ago
- A collection of sources of indicators of compromise.☆954May 8, 2025Updated 10 months ago
- OSSEM Detection Model☆183Oct 11, 2022Updated 3 years ago
- A curated list featuring OSs, hacking, cybersecurity, network security, and IT-related subreddits.☆32Jan 1, 2026Updated 2 months ago
- All-in-one bundle of MISP, TheHive and Cortex☆170Sep 27, 2022Updated 3 years ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆34Jun 19, 2025Updated 8 months ago
- AWS S3 Bucket/Object Finder☆25Nov 11, 2017Updated 8 years ago
- Evaluating and Reporting on Azure Active Directory/Active Directory Users Security Posture☆29May 8, 2019Updated 6 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Jan 31, 2023Updated 3 years ago
- ☆33May 19, 2024Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Jan 31, 2022Updated 4 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Mar 15, 2022Updated 3 years ago