ThreatModel SDK
A minimalistic Java library for representing threat model data in a normalized way and automating threat intelligence extraction.
This is a collection of APT and cybercriminals campaigns. The password of malware samples could be 'virus' or 'infected'. URL to PDF Tool Print Friendly & PDF Reference Resources include kbandla, APTnotes, Florian Roth - APT Groups, Attack Wiki, threat-INTel, targetedthreats, Raw Threat Intelligence, APT search, APT Sample by 0xffff0800, APT Map, sapphirex00 - Threat-Hunting, APTSimulator, MITRE Att&CK: Group, APT_REPORT collected by @blackorbird, Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups, APT_Digital_Weapon, vx-underground, StrangerealIntel-EternalLiberty. Evasive Panda leverages Monlam Festival to target Tibetans. When Cats Fly: Suspected Iranian Threat Actor UNC1549 Targets Israeli and Middle East Aerospace and Defense Sectors. ConnectWise ScreenConnect attacks deliver malware. inside I-Soon APT(Earth Lusca) operation center. Staying ahead of threat actors in the age of AI. Staying ahead of threat actors in the age of AI. Trend Micro: The Evolution of Cybercrime.
A minimalistic Java library for representing threat model data in a normalized way and automating threat intelligence extraction.
A threat hunting capability that leverages Sysmon and MITRE ATT&CK on Azure Sentinel
Acapulco is a Splunk application that automatically generates meta-events from hpfeeds channels and visualizes them using D3.js.
A modular tool for collecting intelligence sources for files and outputting in CSV format.
PolySwarm is a malware intelligence marketplace that aggregates threat detection engines to provide early detection, unique samples, and higher accuracy.
msticpy is a library for InfoSec investigation and hunting in Jupyter Notebooks with extensive functionality for log data analysis, threat intelligence enrichment, and visualization.