Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

Projects in Awesome Lists tagged with cyber-threat-intelligence

A curated list of projects in awesome lists tagged with cyber-threat-intelligence .

https://github.com/mitre-attack/attack-navigator

Web app that provides basic navigation and annotation of ATT&CK matrices

cti cyber-threat-intelligence cybersecurity mitre-attack mitre-corporation

Last synced: 19 Dec 2024

https://mitre-attack.github.io/attack-navigator/

Web app that provides basic navigation and annotation of ATT&CK matrices

cti cyber-threat-intelligence cybersecurity mitre-attack mitre-corporation

Last synced: 06 Nov 2024

https://github.com/mitre/cti

Cyber Threat Intelligence Repository expressed in STIX 2.0

attack cti cyber-threat-intelligence stix

Last synced: 03 Dec 2024

https://github.com/center-for-threat-informed-defense/adversary_emulation_library

An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.

adversary-emulation adversary-emulation-plans ctid cyber-threat-intelligence cybersecurity mitre-attack red-team threat-informed-defense

Last synced: 14 Dec 2024

https://github.com/mytechnotalent/hacking-windows

A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.

assembler assembly blue-team cplusplus cpp cyber cyber-threat-intelligence cybersecurity hack hacking ida ida-pro idapro microsoft-windows reverse-engineering training training-material training-materials win32api windows

Last synced: 17 Dec 2024

https://github.com/mytechnotalent/Hacking-Windows

A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.

assembler assembly blue-team cplusplus cpp cyber cyber-threat-intelligence cybersecurity hack hacking ida ida-pro idapro microsoft-windows reverse-engineering training training-material training-materials win32api windows

Last synced: 31 Oct 2024

https://github.com/center-for-threat-informed-defense/attack-flow

Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.

ctid cyber-threat-intelligence cybersecurity mitre-attack threat-informed-defense

Last synced: 20 Dec 2024

https://github.com/center-for-threat-informed-defense/tram

TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.

ctid cyber-threat-intelligence cybersecurity mitre-attack threat-informed-defense

Last synced: 21 Dec 2024

https://github.com/oasis-open/cti-python-stix2

OASIS TC Open Repository: Python APIs for STIX 2

cti cyber-threat-intelligence json oasis python stix stix2

Last synced: 20 Dec 2024

https://github.com/center-for-threat-informed-defense/cti-blueprints

CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.

ctid cyber-threat-intelligence cybersecurity incident-response malware-analysis mitre-attack threat-actors threat-informed-defense

Last synced: 18 Dec 2024

https://github.com/aw-junaid/hacking-tools

This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.

algorithms artificial-intelligence bugbounty cryptography cyber-threat-intelligence cybersecurity-projects ethical-hacking hacking-tools malware nessus network-monitoring network-security nmap portscanner python pythonprojects threat-intelligence virus-scanning

Last synced: 18 Dec 2024

https://github.com/duggytuxy/malicious_ip_addresses

Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space

botnets cyber-threat-intelligence cybersecurity ddos ipaddresses ipv4 malicious malware zombies

Last synced: 01 Nov 2024

https://github.com/oasis-open/cti-stix-visualization

OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships

cti cyber-threat-intelligence javascript json oasis stix stix2 visualization visualizer

Last synced: 21 Dec 2024

https://github.com/center-for-threat-informed-defense/insider-threat-ttp-kb

The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat TTP Knowledge Base, built upon data collected on insider threat incidents and lessons learned and experience from the ATT&CK knowledge base.

ctid cyber-threat-intelligence cybersecurity insider-threat mitre-attack threat-informed-defense

Last synced: 15 Dec 2024

https://github.com/oasis-open/cti-taxii-server

OASIS TC Open Repository: TAXII 2 Server Library Written in Python

cti cyber-threat-intelligence oasis python python-script server taxii taxii2

Last synced: 21 Dec 2024

https://github.com/oasis-open/cti-stix2-json-schemas

OASIS TC Open Repository: Non-normative schemas and examples for STIX 2

antlr cti cyber-threat-intelligence json json-schema oasis schemas stix stix2

Last synced: 21 Dec 2024

https://github.com/center-for-threat-informed-defense/top-attack-techniques

Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques to focus on first.

ctid cyber-threat-intelligence cybersecurity mitre-attack

Last synced: 07 Nov 2024

https://github.com/oasis-open/cti-taxii-client

OASIS TC Open Repository: TAXII 2 Client Library Written in Python

client cti cyber-threat-intelligence json oasis python taxii taxii2

Last synced: 20 Dec 2024

https://github.com/oasis-open/cti-documentation

OASIS TC Open Repository: GitHub Pages site for STIX and TAXII

cti cyber-threat-intelligence json oasis stix stix2 taxii taxii2

Last synced: 20 Dec 2024

https://github.com/traut/stixview

STIX2 graph visualisation library in JS

cti cyber-security cyber-threat-intelligence graph library security stix stix2

Last synced: 08 Dec 2024

https://github.com/center-for-threat-informed-defense/attack-powered-suit

ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, context menus, and ATT&CK Navigator integration.

browser-extension chrome-extension ctid cyber-threat-intelligence mitre-attack

Last synced: 17 Dec 2024

https://github.com/secutils-dev/secutils

Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers

api certificate-authority certificates cyber-threat-intelligence developer-tools dsa ec open-security pem pkcs12 pkcs8 rsa-cryptography rust security security-tools x509

Last synced: 26 Sep 2024

https://github.com/referefref/honeydet

Signature based honeypot detector tool written in Golang

cyber-threat-intelligence deception-technology honeypot honeypots offen red-team

Last synced: 02 Nov 2024

https://github.com/oasis-open/cti-stix-validator

OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices

cti cyber-threat-intelligence json oasis python python-script stix stix-validator stix2 stix2-validator validation validator

Last synced: 20 Dec 2024

https://github.com/referefref/modpot

Modular web-application honeypot platform built using go and gin

cti cyber-threat-intelligence golang honeypot

Last synced: 02 Nov 2024

https://github.com/oasis-open/cti-stix-elevator

OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON

converter cti cyber-threat-intelligence json oasis python python-script stix stix2 xml

Last synced: 13 Dec 2024

https://github.com/center-for-threat-informed-defense/cloud-analytics

Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as well as a blueprint for how others can create and use cloud analytics effectively.

analytics cloud cloud-computing ctid cyber-analytics cyber-threat-intelligence cybersecurity mitre-attack

Last synced: 07 Nov 2024

https://github.com/oasis-open/cti-stix-generator

OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/cti-stix-generator

cti cyber-threat-intelligence generation generator json jupyter oasis python stix stix2 stix2-generator

Last synced: 13 Nov 2024

https://github.com/center-for-threat-informed-defense/sightings_ecosystem

Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE ATT&CK® techniques observed to give defenders real data on technique prevalence.

ctid cyber-threat-intelligence cybersecurity data-science data-visualization mitre-attack

Last synced: 07 Nov 2024

https://github.com/traut/jupyter-widget-stixview

STIX2 graph widget for Jupyter notebooks, powered by stixview library

cti cyber-security cyber-threat-intelligence cybersecurity graph jupyter jupyter-notebook jupyter-widget security stix2

Last synced: 29 Sep 2024

https://github.com/oasis-open/cti-pattern-validator

OASIS TC Open Repository: Validate patterns used to express cyber observable content in STIX Indicators

cti cyber-threat-intelligence oasis python python-script stix stix2 validator

Last synced: 13 Dec 2024

https://github.com/muchdogesec/txt2stix

txt2stix is a Python script that is designed to identify and extract IoCs and TTPs from text files, identify the relationships between them, convert them to STIX 2.1 objects, and output as a STIX 2.1 bundle.

cyber-threat-intelligence stix2 stix2-extensions stix2-patterns

Last synced: 12 Nov 2024

https://github.com/center-for-threat-informed-defense/technique-inference-engine

TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.

ctid cyber-threat-intelligence cybersecurity machine-learning mitre-attack threat-informed-dense

Last synced: 07 Nov 2024

https://github.com/oasis-open/cti-stix-slider

OASIS TC Open Repository: The repository cti-stix-slider supports development of a Python application to convert STIX 2.0 content to STIX 1.x content

converter cti cyber-threat-intelligence json oasis python python-script stix stix2 xml

Last synced: 13 Dec 2024

https://github.com/stephenott/taxii-server

TAXII Server supporting the 2.1 spec.

cti cyber-threat-intelligence taxii taxii-server taxii2

Last synced: 27 Oct 2024

https://github.com/paulveillard/cybersecurity-soar

A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Security Orchestration, Automation and Response (SOAR).

compliance-as-code compliant cyber-threat-intelligence design-patterns hacking-tools incident-management incident-matrix incident-response ios-hacking orchestration orchestration-services os-hardening regulatory scalability scalable-applications security-hardening siem soar

Last synced: 07 Dec 2024

https://github.com/mustafadalga/code-injector

Aynı ağ içerisinde , ARP Spoofing saldırısı yapılmış hedef bilgisayarın ziyaret ettiği , HTTP protokolünü kullanan web sitelerine kod enjekte ederek manipüle etmenize yarayan bir script.

code-injection cyber-security cyber-threat-intelligence cybersecurity exploit hacker hacking hacking-code hacking-tool hacking-tools hackingtools python python-3 python-script python3 web-hackathon web-hacking website-hacking

Last synced: 17 Nov 2024

https://github.com/paulveillard/cybersecurity-blue-team

A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team in Cybersecurity.

blue blue-team cyber-threat-intelligence cybernetics cybersecurity vulnerabilities vulnerability-identification vulnerability-management vulnerability-research vulnerability-scanners vulnerability-scanning

Last synced: 07 Dec 2024

https://github.com/paulveillard/cybsecurity-cs

A collection of CS tools, software, libraries, learning tutorials, frameworks, academic and practical resources for Computer Science students in Cybersecurity

computer-architecture computer-science computer-science-and-engineering computer-science-project computer-science-students computer-security cyber-threat-intelligence cybersecurity cyberweapon frameworks practice-programming security-tools

Last synced: 07 Dec 2024

https://github.com/sdushantha/datainnbrudd.no

Overivew of all cyber incidients in Norway

breach cti cyber-threat-intelligence databreach threat-intelligence

Last synced: 12 Dec 2024

https://github.com/ail-project/ail-feeder-leak

AIL LeakFeeder: A Module for AIL Framework that automate the process to feed leaked files automatically

ail-feeder ail-framework automation cyber-threat-intelligence cybersecurity feeder python3 threat-hunting

Last synced: 12 Nov 2024

https://github.com/paulveillard/cybersecurity-web-security

An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Web Security in Cybersecurity.

cyber-threat-intelligence cybersecurity-assessments ddos ddos-attacks security-tools services sql-injection web website xss-attacks xss-detection xss-scanner xss-vulnerability

Last synced: 07 Dec 2024

https://github.com/loneicewolf/ctio

CTIO - Cyber Threat Intelligence Overlay

ctio cyber-threat-intelligence

Last synced: 06 Nov 2024

https://github.com/center-for-threat-informed-defense/m3tid

The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activities associated with its practice.

adversary-emulation ctid cyber-threat-intelligence cybersecurity detection-engineering mitre-attack threat-informed-defense

Last synced: 07 Nov 2024

https://github.com/jmousqueton/opencti-docker

docker-compose configuration to install OpenCTI with connectors (check my blog post for more information)

cyber-threat-intelligence cybersecurity opencti threat-intelligence

Last synced: 10 Nov 2024

https://github.com/loneicewolf/soc-200-lightpreparation

My (currently only in theory) light preparation for the SOC-200 course (will probably take it **sometime** )

cyber-threat-intelligence methodology offsec pentesting soc200-osda

Last synced: 06 Nov 2024

https://github.com/loneicewolf/pen300-template

My Mark Down Template for Advanced Note Taking. Will look weird.

cyber-threat-intelligence equationgroup fannybmp fannyworm loneicewolf

Last synced: 06 Nov 2024

https://github.com/paulveillard/cybersecurity-talks

An ongoing curated collection of awesome software, libraries, frameworks, talks, best practices, learning tutorials and important practical resources in Security.

cyber-threat-intelligence cybertalents presentation-slides security security-tools speaking-resources speech-recognition talk-preparation talks talks-and-papers

Last synced: 07 Dec 2024

https://github.com/sumidcyber/portpatrol

PortPatrol is a comprehensive network management and security tool designed to analyze network traffic and enhance server security by managing and closing unused ports. This tool is particularly useful for administrators who need to ensure that only necessary ports are open on their servers, thereby reducing potential security vulnerabilities.

cyber-security cyber-security-team cyber-threat-intelligence cybersecurity-tool docker go golang network-analysis network-programming network-programming-lab nmap openportsscanner server

Last synced: 02 Dec 2024

https://github.com/center-for-threat-informed-defense/threat-modeling-with-attack

Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.

attack-trees ctid cyber-threat-intelligence cybersecurity mitre-attack threat-informed-defense threat-modeling

Last synced: 07 Nov 2024

https://github.com/paulveillard/cybersecurity-cyberloss

An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Cyber Loss in Cybersecurity.

banking-applications banking-system cyber cyber-attack-detection cyber-audit cyber-intelligence cyber-threat-intelligence cyber-training cyberattack cyberattacks loss

Last synced: 07 Dec 2024

https://github.com/paulveillard/cybersecurity-cyberinsurance

An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Cyber Insurance in Cybersecurity.

cyber cyber-analytics cyber-physical-systems cyber-security-team cyber-threat-intelligence cyberawareness cybercrime cybercrime-prevention cyberinsurance cybersecurity

Last synced: 07 Dec 2024

https://github.com/0xflux/rust_shellcode

Creating raw shellcode by writing a stack only Rust program, includes an injector!

cyber cyber-security cyber-threat-intelligence cybersecurity malware malware-analysis malware-development malware-research offensive-security rust

Last synced: 20 Nov 2024

https://github.com/muchdogesec/ransomwhere2stix

Converts ransomwhe.re data into STIX objects for integration with downstream intel tooling.

cyber-threat-intelligence ransomware stix2

Last synced: 12 Nov 2024

https://github.com/rsn601kri/guard.code

The Cybersecurity Threat Intelligence Report Generator is an AI-powered tool built using Google's Gemini Pro API and Streamlit. This application allows users to input cybersecurity event details and receive a formal, structured threat intelligence report.

cyber cyber-threat-intelligence gemini-pro nlp-machine-learning

Last synced: 09 Dec 2024

https://github.com/faizan-khanx/sql-commandgenerator

sql.cyberethic.in is a web-based tool designed to simplify SQL injection testing by generating SQLMap commands. It allows users to easily select attack techniques, customize parameters, and generate optimized SQLMap commands without the need for manual coding. Perfect for penetration testers and ethical hackers looking to save time and avoid errors

cyber-threat-intelligence cybersecurity explorer hacking hacking-tool sql sqlinjection sqlmap

Last synced: 16 Dec 2024

https://github.com/zahraarshia/cti_crawl

This cyber threat intelligence crawler can be used to gather information from various sources, including open-source and commercial feeds.

crawler cti cyber-news-bot cyber-threat-intelligence mongodb python scrapy sqlite3 web-scraper

Last synced: 11 Nov 2024