Topic: cyber-threat-intelligence Goto Github
Some thing interesting about cyber-threat-intelligence
Some thing interesting about cyber-threat-intelligence
cyber-threat-intelligence,Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
User: bushidouk
cyber-threat-intelligence,Further investigation in to APT campaigns disclosed by private security firms and security agencies
User: bushidouk
cyber-threat-intelligence,An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Organization: center-for-threat-informed-defense
Home Page: https://ctid.io/adversary-emulation
cyber-threat-intelligence,🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
Organization: center-for-threat-informed-defense
Home Page: https://center-for-threat-informed-defense.github.io/mappings-explorer/external/nist/
cyber-threat-intelligence,Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
Organization: center-for-threat-informed-defense
Home Page: https://ctid.io/attack-flow
cyber-threat-intelligence,ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, context menus, and ATT&CK Navigator integration.
Organization: center-for-threat-informed-defense
Home Page: https://ctid.io/attack-powered-suit
cyber-threat-intelligence,🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
Organization: center-for-threat-informed-defense
Home Page: https://center-for-threat-informed-defense.github.io/mappings-explorer/external/veris/
cyber-threat-intelligence,Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as well as a blueprint for how others can create and use cloud analytics effectively.
Organization: center-for-threat-informed-defense
Home Page: https://ctid.mitre-engenuity.org/our-work/cloud-analytics/
cyber-threat-intelligence,CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
Organization: center-for-threat-informed-defense
Home Page: https://ctid.io/cti-blueprints
cyber-threat-intelligence,The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat TTP Knowledge Base, built upon data collected on insider threat incidents and lessons learned and experience from the ATT&CK knowledge base.
Organization: center-for-threat-informed-defense
Home Page: https://ctid.io/insider-threat
cyber-threat-intelligence,Top ATT&CK Techniques provides defenders with a systematic approach to prioritizing ATT&CK techniques.
Organization: center-for-threat-informed-defense
Home Page: https://ctid.io/top-attack-techniques
cyber-threat-intelligence,TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
Organization: center-for-threat-informed-defense
Home Page: https://ctid.mitre-engenuity.org/our-work/tram/
cyber-threat-intelligence,Chista | Open Threat Intelligence Framework
Organization: chistadev
cyber-threat-intelligence,A visualized overview of the Initial Access Broker (IAB) cybercrime landscape
Organization: curated-intel
cyber-threat-intelligence,TAXII server implementation in Python from EclecticIQ
Organization: eclecticiq
cyber-threat-intelligence,Threat Intel Platform for T-POTs
Organization: intelowlproject
cyber-threat-intelligence,IntelOwl: manage your Threat Intelligence at scale
Organization: intelowlproject
Home Page: https://intelowlproject.github.io
cyber-threat-intelligence,pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
User: jackaduma
cyber-threat-intelligence,Extracting Attack Behavior from Threat Reports
User: jackaduma
cyber-threat-intelligence,ATT&CK Evaluations website (DEPRECATED)
Organization: mitre-attack
Home Page: https://attackevals.mitre.org
cyber-threat-intelligence,Web app that provides basic navigation and annotation of ATT&CK matrices
Organization: mitre-attack
Home Page: https://mitre-attack.github.io/attack-navigator
cyber-threat-intelligence,Scripts and a (future) library to improve users' interactions with the ATT&CK content
Organization: mitre-attack
cyber-threat-intelligence,STIX data representing MITRE ATT&CK
Organization: mitre-attack
Home Page: https://attack.mitre.org/
cyber-threat-intelligence,MITRE ATT&CK Website
Organization: mitre-attack
Home Page: https://attack.mitre.org
cyber-threat-intelligence,Cyber Analytics Repository
Organization: mitre-attack
cyber-threat-intelligence,A python module for working with ATT&CK
Organization: mitre-attack
Home Page: https://mitreattack-python.readthedocs.io/
cyber-threat-intelligence,A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
User: mytechnotalent
cyber-threat-intelligence,A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
User: mytechnotalent
cyber-threat-intelligence,A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
User: mytechnotalent
cyber-threat-intelligence,OASIS TC Open Repository: GitHub Pages site for STIX and TAXII
Organization: oasis-open
Home Page: https://oasis-open.github.io/cti-documentation/
cyber-threat-intelligence,OASIS TC Open Repository: Python APIs for STIX 2
Organization: oasis-open
Home Page: https://stix2.readthedocs.io/
cyber-threat-intelligence,OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON
Organization: oasis-open
Home Page: https://stix2-elevator.readthedocs.io/en/latest/
cyber-threat-intelligence,OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices
Organization: oasis-open
Home Page: https://stix2-validator.readthedocs.io/
cyber-threat-intelligence,OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships
Organization: oasis-open
Home Page: http://oasis-open.github.io/cti-stix-visualization
cyber-threat-intelligence,OASIS TC Open Repository: Non-normative schemas and examples for STIX 2
Organization: oasis-open
Home Page: https://github.com/oasis-open/cti-stix2-json-schemas
cyber-threat-intelligence,OASIS TC Open Repository: TAXII 2 Client Library Written in Python
Organization: oasis-open
Home Page: https://taxii2client.readthedocs.io/
cyber-threat-intelligence,OASIS TC Open Repository: TAXII 2 Server Library Written in Python
Organization: oasis-open
Home Page: https://medallion.readthedocs.io/
cyber-threat-intelligence,Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.
User: osmankandemir
cyber-threat-intelligence,A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Security Orchestration, Automation and Response (SOAR).
User: paulveillard
cyber-threat-intelligence,Modular web-application honeypot platform built using go and gin
User: referefref
Home Page: https://jamesbrine.com.au
cyber-threat-intelligence,Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers
Organization: secutils-dev
Home Page: https://secutils.dev
cyber-threat-intelligence,SEKOIA.IO Documentation - The Intelligence-Driven SaaS SIEM
Organization: sekoia-io
Home Page: https://docs.sekoia.io
cyber-threat-intelligence,Cortex: a Powerful Observable Analysis and Active Response Engine
Organization: thehive-project
Home Page: https://thehive-project.org
cyber-threat-intelligence,Cortex Analyzers Repository
Organization: thehive-project
Home Page: https://TheHive-Project.github.io/Cortex-Analyzers/
cyber-threat-intelligence,STIX2 graph visualisation library in JS
User: traut
Home Page: https://traut.github.io/stixview/
cyber-threat-intelligence,Suricata rules for network anomaly detection
User: travisbgreen
Home Page: http://travisgreen.net
cyber-threat-intelligence,A python app to predict Att&ck tactics and techniques from cyber threat reports
User: vlegoy
cyber-threat-intelligence,Cyber Threat Intelligence Data, Indicators, and Analysis
Organization: vuldb
Home Page: https://vuldb.com/?kb.cti
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.