Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc
-
Updated
Jun 3, 2024
Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc
Defense Evasion Techniques Repository. This repository contains a collection of techniques designed to bypass Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) systems.
SEKOIA.IO Documentation - The Intelligence-Driven SaaS SIEM
txt2stix is a Python script that is designed to identify and extract IoCs and TTPs from text files, identify the relationships between them, convert them to STIX 2.1 objects, and output as a STIX 2.1 bundle.
This repository holds: 1) custom STIX 2.1 Objects DOGESEC have created, and 2) generic STIX 2.1 Objects that are imported to different DOGESEC products.
List of malware and other malicious artifacts sha256 hashes
List of malware and other malicious artifacts md5 hashes
Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space
Tools for analyzing cyber-security reports and extract information
IntelOwl: manage your Threat Intelligence at scale
Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers
List of phishing_scam_domains
MITRE ATT&CK Website
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Web app that provides basic navigation and annotation of ATT&CK matrices
Threat Intel Platform for T-POTs
Cortex Analyzers Repository
The Intelligence Analyst's Workstation
Add a description, image, and links to the cyber-threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the cyber-threat-intelligence topic, visit your repo's landing page and select "manage topics."