Here's samples of android/ios spyware named "Pegasus" made by the NSOGROUP
-
Updated
Jul 27, 2021
Here's samples of android/ios spyware named "Pegasus" made by the NSOGROUP
MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats
An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.
Graph Representation of MITRE ATT&CK's CTI data
A new way for you to structure your threat content.
Sharing our knowledge and resources in the field of cyber security.
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
This directory contains a templates for you to build your own system.
SACTI - Securely aggregate CTI sightings and report them on MISP
The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products, versions, CVEs, etc.
Phishing Url detector detects cyber thefts and cyber frauds using machine learning and data science technology. TECH used- Python, Django(Backend), SQLite, IBM cloud, data science, machine learning.
A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry Needs, developed by those in trenches.
Alguns links legais para quem gostaria de entender ou entrar na area de Cyber Threat Intelligence / CTI.
Resources for FIRST CTI Conference 2023 presentation
Python script for ingesting IOCs from PRODAFT USTA to Azure Sentinel
To extract the usernames attempted by a compromised host. This information is obtained from Abuse IP DB, reports' comments.
Criminal IP is a comprehensive OSINT-based Cyber Threat Intelligence (CTI) search engine that can be used as an automated Attack Surface Management solution.
ScaryCon is a South African conference promoted by ScaryByte to demonstrate cybersecurity and cyber intelligence in its reality.
Supporting Cyber Threat Intelligence Tools
Add a description, image, and links to the cyberthreatintelligence topic page so that developers can more easily learn about it.
To associate your repository with the cyberthreatintelligence topic, visit your repo's landing page and select "manage topics."