vuldb / cyber_threat_intelligence
Cyber Threat Intelligence Data, Indicators, and Analysis
☆84Updated 3 months ago
Alternatives and similar repositories for cyber_threat_intelligence:
Users that are interested in cyber_threat_intelligence are comparing it to the libraries listed below
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- Open IOC sharing platform☆56Updated 5 months ago
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆72Updated 4 months ago
- The Threat Actor Profile Guide for CTI Analysts☆106Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆116Updated last month
- Resources To Learn And Understand SIGMA Rules☆174Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 2 years ago
- Useful resources about phishing email analysis☆81Updated 2 months ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated last month
- ☆43Updated 2 years ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆113Updated last year
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆38Updated 3 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆61Updated 11 months ago
- ☆65Updated 2 years ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆77Updated 5 months ago
- IOC Collection 2022☆57Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆63Updated last year
- Linux Evidence Acquisition Framework☆114Updated 6 months ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆53Updated 2 years ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Source code used at TweetFeed.live☆41Updated 2 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- ☆96Updated 3 months ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated last week
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆27Updated 3 weeks ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆85Updated last year