IntelOwl: manage your Threat Intelligence at scale
-
Updated
Nov 8, 2024 - Python
IntelOwl: manage your Threat Intelligence at scale
Web app that provides basic navigation and annotation of ATT&CK matrices
Cyber Threat Intelligence Repository expressed in STIX 2.0
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Cortex: a Powerful Observable Analysis and Active Response Engine
Cyber Analytics Repository
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc
MITRE ATT&CK Website
🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
A python module for working with ATT&CK
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
Cortex Analyzers Repository
STIX data representing MITRE ATT&CK
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space
Add a description, image, and links to the cyber-threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the cyber-threat-intelligence topic, visit your repo's landing page and select "manage topics."