There are 64 repositories under cyber-threat-intelligence topic.
IntelOwl: manage your Threat Intelligence at scale
Web app that provides basic navigation and annotation of ATT&CK matrices
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Cortex: a Powerful Observable Analysis and Active Response Engine
Cyber Analytics Repository
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc
MITRE ATT&CK Website
A python module for working with ATT&CK
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
Cortex Analyzers Repository
OASIS TC Open Repository: Python APIs for STIX 2
STIX data representing MITRE ATT&CK
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
Lists of addresses of the most active C2, Botnets, Zombies, Scanners DST = France & Belgium
TAXII server implementation in Python from EclecticIQ
Suricata rules for network anomaly detection
OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships
The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat TTP Knowledge Base, built upon data collected on insider threat incidents and lessons learned and experience from the ATT&CK knowledge base.
Threat Intel Platform for T-POTs
OASIS TC Open Repository: TAXII 2 Server Library Written in Python
OASIS TC Open Repository: Non-normative schemas and examples for STIX 2
Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques to focus on first.
OASIS TC Open Repository: TAXII 2 Client Library Written in Python
A visualized overview of the Initial Access Broker (IAB) cybercrime landscape
This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.
OASIS TC Open Repository: GitHub Pages site for STIX and TAXII
Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.