tiagosequeira's Stars
codecrafters-io/build-your-own-x
Master programming by recreating your favorite technologies from scratch.
kbandla/APTnotes
Various public documents, whitepapers and articles about APT campaigns
blackorbird/APT_REPORT
Interesting APT Report Collection And Some Special IOC
microsoft/msticpy
Microsoft Threat Intelligence Security Tools
tsale/EDR-Telemetry
This project aims to compare and evaluate the telemetry of various EDR products.
aptnotes/data
APTnotes data
BushidoUK/Ransomware-Tool-Matrix
A resource containing all the tools each ransomware gangs uses
VirusTotal/yara-x
A rewrite of YARA in Rust.
ocsf/ocsf-schema
OCSF Schema
mrwadams/stride-gpt
An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRIDE methodology.
cisagov/vulnrichment
A repo to conduct vulnerability enrichment.
S3N4T0R-0X0/APT-Attack-Simulation
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here.
center-for-threat-informed-defense/tram
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
0x4D31/galah
Galah: An LLM-powered web honeypot.
muchdogesec/awesome_threat_intel_blogs
A curated list of Awesome Threat Intelligence Blogs
center-for-threat-informed-defense/cti-blueprints
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
cybershujin/Threat-Actors-use-of-Artifical-Intelligence
BushidoUK/CTI-Analyst-Challenge
An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.
MISP/misp-playbooks
MISP Playbooks
dwillowtree/diana
Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )
docintelapp/DocIntel
Open Source Platform for storing, organizing, and searching documents related to cyber threats
center-for-threat-informed-defense/insider-threat-ttp-kb
The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat TTP Knowledge Base, built upon data collected on insider threat incidents and lessons learned and experience from the ATT&CK knowledge base.
CERT-Polska/n6
Automated handling of data feeds for security teams
infosecn1nja/VeilTransfer
VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration techniques used by advanced threat actors, allowing organizations to evaluate and improve their security posture.
MHaggis/notes
Full of public notes and Utilities
ksthk/one
One Conference 2024
tidalcyber/cyber-threat-profiling
A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense
cudeso/misp2sentinel
MISP to Sentinel integration
cedricbonhomme/pyHIDS
A HIDS (host-based intrusion detection system) for verifying the integrity of a system.
aaronkaplan/cti-llm
An LLM for CTI reports - to be presented at FIRST Fukuoka 2024