49 Open Source Cyber Threat Intelligence Software Projects
Free and open source cyber threat intelligence code projects including engines, APIs, generators, and tools.
Attack Scripts 415 ⭐
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Cti Stix Visualization 70 ⭐
OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships
Cti Stix Elevator 42 ⭐
OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON
Cti Stix Validator 30 ⭐
OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices
Cti Pattern Validator 18 ⭐
OASIS TC Open Repository: Validate patterns used to express cyber observable content in STIX Indicators
Cti Stix Slider 17 ⭐
OASIS TC Open Repository: The repository cti-stix-slider supports development of a Python application to convert STIX 2.0 content to STIX 1.x content
Adversary_emulation_library 520 ⭐
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Reverse Engineering Tutorial 5965 ⭐
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Zeek Network Security Monitor 28 ⭐
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Attack Control Framework Mappings 243 ⭐
Security control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Attack_to_veris 44 ⭐
The principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Exploring Apt Campaigns 38 ⭐
Further investigation in to APT campaigns disclosed by private security firms and security agencies
Hacking Windows 40 ⭐
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Tram 84 ⭐
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
Cti Stix Generator 18 ⭐
OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/cti-stix-generator
Hm Seclab Yafra 18 ⭐
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stix Icons 14 ⭐
stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats according to the STIX language for intelligence exchange, defined by OASIS Cyber Threat Intelligence (CTI) TC
Initial Access Broker Landscape 57 ⭐
A visualized overview of the Initial Access Broker (IAB) cybercrime landscape
Abused Legitimate Services 13 ⭐
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Sightings_ecosystem 13 ⭐
This project aims to fundamentally advance our collective ability to see threat activity across organizational, platform, vendor and geographical boundaries.