Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
#

cyberthreatintelligence

Here are 37 public repositories matching this topic...

An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.

  • UpdatedJul 3, 2024

Here's samples of android/ios spyware named "Pegasus" made by the NSOGROUP

  • UpdatedJul 27, 2021

MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats

  • UpdatedJul 10, 2025
  • Python

An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.

  • UpdatedJan 16, 2023

A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry Needs, developed by those in trenches.

  • UpdatedApr 22, 2025

The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products, versions, CVEs, etc.

  • UpdatedNov 29, 2023
  • Lua
sacti

SACTI - Securely aggregate CTI sightings and report them on MISP

  • UpdatedOct 24, 2022
  • Python
CTI-Stuffs

This directory contains a templates for you to build your own system.

  • UpdatedFeb 13, 2025

A new way for you to structure your threat content.

  • UpdatedOct 24, 2024

Phishing Url detector detects cyber thefts and cyber frauds using machine learning and data science technology. TECH used- Python, Django(Backend), SQLite, IBM cloud, data science, machine learning.

  • UpdatedJun 22, 2022
  • Python

Criminal IP is a comprehensive OSINT-based Cyber Threat Intelligence (CTI) search engine that can be used as an automated Attack Surface Management solution.

  • UpdatedApr 12, 2023
  • Python

To extract the usernames attempted by a compromised host. This information is obtained from Abuse IP DB, reports' comments.

  • UpdatedFeb 18, 2022
  • Python

Experimental RAG that consumes Cyber Security articles via RSS

  • UpdatedNov 29, 2024
  • Jupyter Notebook

Dataset Release on our paper, Threat Behavior Textual Search by Attention Graph Ismorphism

  • UpdatedApr 16, 2024

Data Analysis of iSoon's Leaked Data Dump

  • UpdatedFeb 24, 2024
  • Jupyter Notebook

A static HTML page for quick OSINT pivoting.

  • UpdatedNov 18, 2023
  • HTML

Improve this page

Add a description, image, and links to thecyberthreatintelligence topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with thecyberthreatintelligence topic, visit your repo's landing page and select "manage topics."

Learn more


[8]ページ先頭

©2009-2025 Movatter.jp