An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.
-
Updated
Jul 3, 2024
An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.
Here's samples of android/ios spyware named "Pegasus" made by the NSOGROUP
MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats
Graph Representation of MITRE ATT&CK's CTI data
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Sharing our knowledge and resources in the field of cyber security.
A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry Needs, developed by those in trenches.
SACTI - Securely aggregate CTI sightings and report them on MISP
The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products, versions, CVEs, etc.
This directory contains a templates for you to build your own system.
A new way for you to structure your threat content.
Phishing Url detector detects cyber thefts and cyber frauds using machine learning and data science technology. TECH used- Python, Django(Backend), SQLite, IBM cloud, data science, machine learning.
To extract the usernames attempted by a compromised host. This information is obtained from Abuse IP DB, reports' comments.
Criminal IP is a comprehensive OSINT-based Cyber Threat Intelligence (CTI) search engine that can be used as an automated Attack Surface Management solution.
ttpnav is a Python library that simplifies navigating MITRE ATT&CK data, enabling users to effortlessly retrieve comprehensive information about specific techniques with a single query. It provides details on mitigations, detections, procedure examples, groups, and related software/tools, streamlining cybersecurity analysis.
A static HTML page for quick OSINT pivoting.
Alguns links legais para quem gostaria de entender ou entrar na area de Cyber Threat Intelligence / CTI.
Resources for FIRST CTI Conference 2023 presentation
Dataset Release on our paper, Threat Behavior Textual Search by Attention Graph Ismorphism
Add a description, image, and links to the cyberthreatintelligence topic page so that developers can more easily learn about it.
To associate your repository with the cyberthreatintelligence topic, visit your repo's landing page and select "manage topics."