vuldb / cyber_threat_intelligence
Cyber Threat Intelligence Data, Indicators, and Analysis
☆84Updated 3 months ago
Alternatives and similar repositories for cyber_threat_intelligence:
Users that are interested in cyber_threat_intelligence are comparing it to the libraries listed below
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆110Updated 3 weeks ago
- Source code used at TweetFeed.live☆42Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆71Updated 4 months ago
- Open IOC sharing platform☆56Updated 4 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆163Updated last year
- Repository of public reference frameworks for the DFIR community.☆115Updated last year
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆76Updated 4 months ago
- ☆65Updated 3 years ago
- IOC Collection 2022☆57Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆61Updated last year
- Sigma rules to share with the community☆119Updated last month
- ☆41Updated 2 years ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆85Updated last year
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 10 months ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆53Updated 2 years ago
- ☆47Updated 11 months ago
- ☆96Updated 3 months ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆117Updated last week
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Resources To Learn And Understand SIGMA Rules☆173Updated 2 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆215Updated 9 months ago
- Fast IOC and YARA Scanner☆77Updated 5 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago