CD913's starred repositories

priority-intelligence-requirements-dev

This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements

Stargazers:113Issues:0Issues:0

awesome-cybersecurity

Curated list of awesome cybersecurity companies and solutions.

Stargazers:149Issues:0Issues:0

ATTACKdatamap

A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework

Language:PowerShellLicense:MITStargazers:345Issues:0Issues:0

SIEM

SIEM Tactics, Techiques, and Procedures

License:GPL-3.0Stargazers:535Issues:0Issues:0
Language:TSQLStargazers:8Issues:0Issues:0

AutonomousThreatSweeper

Threat Hunting queries for various attacks

Stargazers:187Issues:0Issues:0

EVTX-to-MITRE-Attack

Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.

License:CC0-1.0Stargazers:485Issues:0Issues:0

SPEED-SIEM-Use-Case-Framework

Repository for SPEED SIEM Use Case Framework

Language:ShellLicense:CC0-1.0Stargazers:52Issues:0Issues:0

Best-README-Template

An awesome README template to jumpstart your projects!

License:MITStargazers:13541Issues:0Issues:0

APT_CyberCriminal_Campagin_Collections

APT & CyberCriminal Campaign Collection

Language:YARAStargazers:3567Issues:0Issues:0

awesome_threat_intel_blogs

A curated list of Awesome Threat Intelligence Blogs from the DOGESEC community.

License:NOASSERTIONStargazers:222Issues:0Issues:0

responsive-html-email-template

A free simple responsive HTML email template

Language:HTMLLicense:MITStargazers:13128Issues:0Issues:0

insider-threat-ttp-kb

The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat TTP Knowledge Base, built upon data collected on insider threat incidents and lessons learned and experience from the ATT&CK knowledge base.

Language:PythonLicense:Apache-2.0Stargazers:130Issues:0Issues:0

awesome-security-newsletters

Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events, vulnerabilities, and analysis of trending threats and attacks

License:GPL-2.0Stargazers:801Issues:0Issues:0

Open-source-tools-for-CTI

Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers

Stargazers:512Issues:0Issues:0

ThreatPursuit-VM

Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.

Language:PowerShellLicense:NOASSERTIONStargazers:1212Issues:0Issues:0

CyberThreatIntel

Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups

Language:JavaScriptStargazers:695Issues:0Issues:0

CyberThreatHunting

A collection of resources for Threat Hunters

Language:PythonLicense:GPL-3.0Stargazers:817Issues:0Issues:0

opencti

Open Cyber Threat Intelligence Platform

Language:JavaScriptLicense:NOASSERTIONStargazers:5174Issues:0Issues:0

OSINT-Framework

OSINT Framework

Language:JavaScriptLicense:MITStargazers:7026Issues:0Issues:0

threat-intel-templates

A set of templates for documenting threat intelligence

Stargazers:72Issues:0Issues:0

sapho

A homebrewed cyber threat intelligence solution

Language:PythonLicense:NOASSERTIONStargazers:18Issues:0Issues:0

my-infosec-awesome

My curated list of awesome links, resources and tools on infosec related topics

License:MITStargazers:1044Issues:0Issues:0

deepdarkCTI

Collection of Cyber Threat Intelligence sources from the deep and dark web

License:GPL-3.0Stargazers:4072Issues:0Issues:0

ctifeeds

Cyber Threat Intelligence Feeds

License:MITStargazers:86Issues:0Issues:0

cti

Cyber Threat Intelligence Repository expressed in STIX 2.0

License:NOASSERTIONStargazers:1671Issues:0Issues:0

TweetFeed

TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.

Stargazers:471Issues:0Issues:0

malware-ioc

Indicators of Compromises (IOC) of our various investigations

Language:YARALicense:BSD-2-ClauseStargazers:1574Issues:0Issues:0

OSINT

Collections of tools and methods created to aid in OSINT collection

Language:PythonStargazers:2694Issues:0Issues:0