IntelOwl: manage your Threat Intelligence at scale
-
Updated
Jan 29, 2026 - Python
IntelOwl: manage your Threat Intelligence at scale
Web app that provides basic navigation and annotation of ATT&CK matrices
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Cyber Threat Intelligence Repository expressed in STIX 2.0
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Cortex: a Powerful Observable Analysis and Active Response Engine
Cyber Analytics Repository
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
A python module for working with ATT&CK
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc
MITRE ATT&CK Website
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
STIX data representing MITRE ATT&CK
🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
Cortex Analyzers Repository
Data-Shield IPv4 Blocklist Community provides an official, curated registry of IPv4 addresses identified as malicious. Updated continuously, this resource offers vital threat intelligence to bolster your Firewall and WAF instances,...
Add a description, image, and links to the cyber-threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the cyber-threat-intelligence topic, visit your repo's landing page and select "manage topics."