Graph Representation of MITRE ATT&CK's CTI data
-
Updated
Nov 14, 2019 - Python
Graph Representation of MITRE ATT&CK's CTI data
MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
SACTI - Securely aggregate CTI sightings and report them on MISP
Phishing Url detector detects cyber thefts and cyber frauds using machine learning and data science technology. TECH used- Python, Django(Backend), SQLite, IBM cloud, data science, machine learning.
To extract the usernames attempted by a compromised host. This information is obtained from Abuse IP DB, reports' comments.
Criminal IP is a comprehensive OSINT-based Cyber Threat Intelligence (CTI) search engine that can be used as an automated Attack Surface Management solution.
ttpnav is a Python library that simplifies navigating MITRE ATT&CK data, enabling users to effortlessly retrieve comprehensive information about specific techniques with a single query. It provides details on mitigations, detections, procedure examples, groups, and related software/tools, streamlining cybersecurity analysis.
This repository contains the code of MalwareInfrastructureHunter (MIH). This code presents the ability for you to add your own censys queries and extract malware infrustructure (other hosts), as also to search for reputation of these identified hosts (VirusTotal,AbuseIPDB) and also to identify files communicating with these hosts (VirusTotal)
Python script for ingesting IOCs from PRODAFT USTA to Azure Sentinel
An automated Cyber Threat Intelligence (CTI) apparatus, implemented via a suite of Free & Open-source Software (FOSS)
Add a description, image, and links to the cyberthreatintelligence topic page so that developers can more easily learn about it.
To associate your repository with the cyberthreatintelligence topic, visit your repo's landing page and select "manage topics."