Converts ransomwhe.re data into STIX objects for integration with downstream intel tooling.
-
Updated
Jun 12, 2024 - Python
Converts ransomwhe.re data into STIX objects for integration with downstream intel tooling.
SEKOIA.IO Documentation - The Intelligence-Driven SaaS SIEM
Repository contains malware IP addresses of C2 infrastructure
This repository holds: 1) custom STIX 2.1 Objects DOGESEC have created, and 2) generic STIX 2.1 Objects that are imported to different DOGESEC products.
Cortex Analyzers Repository
List of phishing_scam_domains
List of malware and other malicious artifacts sha256 hashes
List of malware and other malicious artifacts md5 hashes
Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
The Intelligence Analyst's Workstation
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
Cyber Threat Intelligence Data, Indicators, and Analysis
IntelOwl: manage your Threat Intelligence at scale
This directory contains PDFs to train both humans & models in discussing cyber threats and threat landscapes.
txt2stix is a Python script that is designed to identify and extract IoCs and TTPs from text files, identify the relationships between them, convert them to STIX 2.1 objects, and output as a STIX 2.1 bundle.
Web app that provides basic navigation and annotation of ATT&CK matrices
Add a description, image, and links to the cyber-threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the cyber-threat-intelligence topic, visit your repo's landing page and select "manage topics."