Tools for analyzing cyber-security reports and extract information
-
Updated
Jun 2, 2024 - Python
Tools for analyzing cyber-security reports and extract information
IntelOwl: manage your Threat Intelligence at scale
Dockerized Reporting Intelligence Framework and Threat Response
Defense Evasion Techniques Repository. This repository contains a collection of techniques designed to bypass Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) systems.
Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers
List of phishing_scam_domains
List of malware and other malicious artifacts md5 hashes
List of malware and other malicious artifacts sha256 hashes
Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space
Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc
MITRE ATT&CK Website
SEKOIA.IO Documentation - The Intelligence-Driven SaaS SIEM
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Web app that provides basic navigation and annotation of ATT&CK matrices
Threat Intel Platform for T-POTs
Cortex Analyzers Repository
The Intelligence Analyst's Workstation
Signature based honeypot detector tool written in Golang
Add a description, image, and links to the cyber-threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the cyber-threat-intelligence topic, visit your repo's landing page and select "manage topics."