IntelOwl: manage your Threat Intelligence at scale
-
Updated
Nov 3, 2025 - Python
IntelOwl: manage your Threat Intelligence at scale
Web app that provides basic navigation and annotation of ATT&CK matrices
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Cyber Threat Intelligence Repository expressed in STIX 2.0
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Cortex: a Powerful Observable Analysis and Active Response Engine
Cyber Analytics Repository
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
A python module for working with ATT&CK
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc
MITRE ATT&CK Website
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
STIX data representing MITRE ATT&CK
Cortex Analyzers Repository
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
Data-Shield IPv4 Blocklist provides an additional layer of security to reduce the number and attack surface of your exposed assets (web applications, websites, DMZs, public IPs, etc.), reducing the recon phase and exposure, etc.
Add a description, image, and links to the cyber-threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the cyber-threat-intelligence topic, visit your repo's landing page and select "manage topics."