cyberthreatintelligence
There are 38 repositories under cyberthreatintelligence topic.
BushidoUK/CTI-Analyst-Challenge
An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.
9aylas/Pegasus-samples
Here's samples of android/ios spyware named "Pegasus" made by the NSOGROUP
MISP/misp-stix
MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats
paulveillard/cybersecurity-threat-intelligence
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.
Kirtar22/ATTACK-Threat_Intel
Graph Representation of MITRE ATT&CK's CTI data
cti-cmm/framework
A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry Needs, developed by those in trenches.
hm-seclab/YAFRA
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
PwnLabMe-Project/Security-Resources
Sharing our knowledge and resources in the field of cyber security.
criminalip/CIP-NSE-Script
The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products, versions, CVEs, etc.
COSSAS/sacti
SACTI - Securely aggregate CTI sightings and report them on MISP
spmedia/Threat-Actor-Usernames-Scrape
A collection of intel and usernames scraped from various cybercrime sources & forums. DarkForums, HackForums, Patched, Cracked, BreachForums, LeakBase, & more
gertjanbruggink/templates
This directory contains a templates for you to build your own system.
venation-digital/threatscenario
A new way for you to structure your threat content.
criminalip/zabbix
Criminal IP is a comprehensive OSINT-based Cyber Threat Intelligence (CTI) search engine that can be used as an automated Attack Surface Management solution.
gbikram/ThreatIntelRAG
Experimental RAG that consumes Cyber Security articles via RSS
Hritiksum/Phishing-URL-v5-IBM
Phishing Url detector detects cyber thefts and cyber frauds using machine learning and data science technology. TECH used- Python, Django(Backend), SQLite, IBM cloud, data science, machine learning.
west-wind/abuse-insights
To extract the usernames attempted by a compromised host. This information is obtained from Abuse IP DB, reports' comments.
cwbae10-purdue/CTI-EACL24
Dataset Release on our paper, Threat Behavior Textual Search by Attention Graph Ismorphism
gbikram/iSoon-Leak-Exploration
Data Analysis of iSoon's Leaked Data Dump
gbikram/OSINT-Explorer-Website
A static HTML page for quick OSINT pivoting.
kidrek/VigilIntel
Dans le cadre de l’amélioration continue des capacités de veille cyber, ce projet vise à fournir une synthèse quotidienne des menaces émergentes à partir de sources ouvertes fiables, notamment via l’agrégation de flux RSS spécialisés.
fish-not-phish/ttpnav
ttpnav is a Python library that simplifies navigating MITRE ATT&CK data, enabling users to effortlessly retrieve comprehensive information about specific techniques with a single query. It provides details on mitigations, detections, procedure examples, groups, and related software/tools, streamlining cybersecurity analysis.
gbikram/CTI-Automation-Platform
An automated Cyber Threat Intelligence (CTI) apparatus, implemented via a suite of Free & Open-source Software (FOSS)
LRamony/Cyber-Threat-Intelligence
Alguns links legais para quem gostaria de entender ou entrar na area de Cyber Threat Intelligence / CTI.
sfakiana/FIRST-CTI-2023
Resources for FIRST CTI Conference 2023 presentation
Tengen-12/CTI-Dashboard
A real-time web-based dashboard for visualizing cybersecurity threats using Flask, Power BI, and Tableau.
curtis-hartsell-tm/USTA2Sentinel
Python script for ingesting IOCs from PRODAFT USTA to Azure Sentinel
jacobstickney/sigmarules
This repository contains security detection rules I've created, using the flexible and open Sigma standard, designed to enhance consistency and efficiency in security operations across various log files.
ScaryCon/First-Edition
ScaryCon is a South African conference promoted by ScaryByte to demonstrate cybersecurity and cyber intelligence in its reality.
antoinelewagon33/cyber-risk-horizon-sim
Simulateur de risque cyber
codexlynx/nixos-gowitness
A NixOS module for gowitness.
CyberDoc88/cyberdoc88.github.io
Personal Site
mauricelambert/CTI
Cyberthreat Intelligence CTI
musoniisaac/Zero-Day_Detector
This project provides a comprehensive security monitoring system designed to detect unknown threats and suspicious activities in real-time. The system combines rule-based detection with statistical analysis to identify potential security breaches before they cause significant damage.
Projects-Developer/Malware-Detection-using-Machine-learning-and-Deep-Learnings
Malware poses a significant threat to computer systems, networks, and sensitive data. Project Includes Source Code, PPT, Synopsis, Report, Documents, Base Research Paper & Video tutorials
RiccardoRobb/Cybersec-basic-Certifications
Cyber Security Certificatios