A cross-platform, open-source framework for mapping live cyber threats on a global scale.
-
Updated
Jun 26, 2024
A cross-platform, open-source framework for mapping live cyber threats on a global scale.
List of phishing_scam_domains
Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space
Overivew of all cyber incidients in Norway
A python module for working with ATT&CK
This repository holds: 1) custom STIX 2.1 Objects DOGESEC have created, and 2) generic STIX 2.1 Objects that are imported to different DOGESEC products.
SEKOIA.IO Documentation - The Intelligence-Driven SaaS SIEM
The Intelligence Analyst's Workstation
List of malware and other malicious artifacts sha256 hashes
List of malware and other malicious artifacts md5 hashes
Cortex: a Powerful Observable Analysis and Active Response Engine
IntelOwl: manage your Threat Intelligence at scale
Defense Evasion Techniques Repository. This repository contains a collection of techniques designed to bypass Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) systems.
Cyber Threat Intelligence Data, Indicators, and Analysis
A python bot that uses the Pyrogram API Framework to take a list of Telegram channels and groups and joins them.
txt2stix is a Python script that is designed to identify and extract IoCs and TTPs from text files, identify the relationships between them, convert them to STIX 2.1 objects, and output as a STIX 2.1 bundle.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
MITRE ATT&CK Website
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
Highly configurable scripts for a web scraper intended to be used for cyber threat intelligence
Add a description, image, and links to the cyber-threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the cyber-threat-intelligence topic, visit your repo's landing page and select "manage topics."