There are 73 repositories under cyber-threat-intelligence topic.
IntelOwl: manage your Threat Intelligence at scale
Web app that provides basic navigation and annotation of ATT&CK matrices
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Cortex: a Powerful Observable Analysis and Active Response Engine
Cyber Analytics Repository
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
A python module for working with ATT&CK
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc
MITRE ATT&CK Website
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
Cortex Analyzers Repository
STIX data representing MITRE ATT&CK
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
OASIS TC Open Repository: Python APIs for STIX 2
Ce projet vise à réduire le nombre d'attaques en bloquant les adresses IP identifiées comme abusives, agressives ou malveillantes.
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
TAXII server implementation in Python from EclecticIQ
Suricata rules for network anomaly detection
Threat Intel Platform for T-POTs
OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships
The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat TTP Knowledge Base, built upon data collected on insider threat incidents and lessons learned and experience from the ATT&CK knowledge base.
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
OASIS TC Open Repository: TAXII 2 Server Library Written in Python
This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead in the field. It provides a valuable resource for those dedicated to improving their skills in malware development, malware research, offensive security, security defenses and measures.
OASIS TC Open Repository: Non-normative schemas and examples for STIX 2
Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques to focus on first.
OASIS TC Open Repository: TAXII 2 Client Library Written in Python
A visualized overview of the Initial Access Broker (IAB) cybercrime landscape
This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.