cyberthreatintelligence
Here are 37 public repositories matching this topic...
Language:All
Sort:Most stars
An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.
- Updated
Jul 3, 2024
Here's samples of android/ios spyware named "Pegasus" made by the NSOGROUP
- Updated
Jul 27, 2021
MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats
- Updated
Jul 10, 2025 - Python
Graph Representation of MITRE ATT&CK's CTI data
- Updated
Nov 14, 2019 - Python
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.
- Updated
Jan 16, 2023
A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry Needs, developed by those in trenches.
- Updated
Apr 22, 2025
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
- Updated
Dec 14, 2021 - Python
Sharing our knowledge and resources in the field of cyber security.
- Updated
Aug 22, 2022
The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products, versions, CVEs, etc.
- Updated
Nov 29, 2023 - Lua
SACTI - Securely aggregate CTI sightings and report them on MISP
- Updated
Oct 24, 2022 - Python
A collection of CTI stuffs - intel scraped from various cybercrime sources & forums
- Updated
Jul 10, 2025
This directory contains a templates for you to build your own system.
- Updated
Feb 13, 2025
A new way for you to structure your threat content.
- Updated
Oct 24, 2024
Phishing Url detector detects cyber thefts and cyber frauds using machine learning and data science technology. TECH used- Python, Django(Backend), SQLite, IBM cloud, data science, machine learning.
- Updated
Jun 22, 2022 - Python
Criminal IP is a comprehensive OSINT-based Cyber Threat Intelligence (CTI) search engine that can be used as an automated Attack Surface Management solution.
- Updated
Apr 12, 2023 - Python
To extract the usernames attempted by a compromised host. This information is obtained from Abuse IP DB, reports' comments.
- Updated
Feb 18, 2022 - Python
Experimental RAG that consumes Cyber Security articles via RSS
- Updated
Nov 29, 2024 - Jupyter Notebook
Dataset Release on our paper, Threat Behavior Textual Search by Attention Graph Ismorphism
- Updated
Apr 16, 2024
Data Analysis of iSoon's Leaked Data Dump
- Updated
Feb 24, 2024 - Jupyter Notebook
A static HTML page for quick OSINT pivoting.
- Updated
Nov 18, 2023 - HTML
Improve this page
Add a description, image, and links to thecyberthreatintelligence topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with thecyberthreatintelligence topic, visit your repo's landing page and select "manage topics."