cycat-serviceCyCAT.org API back-end server including crawlers
Stars: ✭ 25 (-81.48%)
Mutual labels: cybersecurity, misp, cti, threat-intelligence, mitre-attack
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+2481.48%)
Mutual labels: cybersecurity, misp, cti, threat-intelligence
mitreattack-pythonA python module for working with ATT&CK
Stars: ✭ 208 (+54.07%)
Mutual labels: cybersecurity, cti, mitre-attack
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+400.74%)
Mutual labels: cybersecurity, misp, threat-intelligence
YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-83.7%)
Mutual labels: cybersecurity, misp, threat-intelligence
attack-evalsATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (-57.78%)
Mutual labels: cybersecurity, cti, mitre-attack
client-pythonOpenCTI Python Client
Stars: ✭ 45 (-66.67%)
Mutual labels: cybersecurity, cti, threat-intelligence
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+4997.78%)
Mutual labels: cybersecurity, cti, threat-intelligence
mitrecnd.github.ioMITRE Shield website
Stars: ✭ 17 (-87.41%)
Mutual labels: cybersecurity, cti, mitre-attack
attckr⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (-83.7%)
Mutual labels: cybersecurity, threat-intelligence, mitre-attack
OpenctiAuthors
Stars: ✭ 2,165 (+1503.7%)
Mutual labels: cybersecurity, cti, threat-intelligence
AutonomousThreatSweepThreat Hunting queries for various attacks
Stars: ✭ 70 (-48.15%)
Mutual labels: cybersecurity, threat-intelligence
attack to verisThe principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Stars: ✭ 56 (-58.52%)
Mutual labels: cybersecurity, mitre-attack
intelligence-iconsintelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; including but not limited to CTI, MISP Threat Sharing, STIX 2.
Stars: ✭ 32 (-76.3%)
Mutual labels: misp, threat-intelligence
Abused-Legitimate-ServicesCloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Stars: ✭ 42 (-68.89%)
Mutual labels: cybersecurity, cti
mail to mispConnect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.
Stars: ✭ 61 (-54.81%)
Mutual labels: misp, threat-intelligence
Malware-Sample-SourcesMalware Sample Sources
Stars: ✭ 214 (+58.52%)
Mutual labels: cybersecurity, threat-intelligence
docker-mispA (nearly) production ready Dockered MISP
Stars: ✭ 184 (+36.3%)
Mutual labels: misp, threat-intelligence
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-41.48%)
Mutual labels: cybersecurity, threat-intelligence
attack-stix-dataSTIX data representing MITRE ATT&CK
Stars: ✭ 118 (-12.59%)
Mutual labels: cybersecurity, cti