Threat Modeling
A summary of the threat modeling posts and final thoughts on the process
This repository provides Python APIs for serializing and de-serializing STIX2 JSON content, along with higher-level APIs for common tasks, including data markings, versioning, and for resolving STIX IDs across multiple data sources. Installation: Install with pip: $ pip install stix2. Usage: To create a STIX object, provide keyword arguments to the type's constructor. Certain required attributes of all objects, such as type or id, will be set automatically if not provided as keyword arguments. To parse a STIX JSON string into a Python STIX object, use parse(). To serialize a STIX object, use serialize().
A summary of the threat modeling posts and final thoughts on the process
A visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC.
A comprehensive and unrestricted dataset of security incidents for research and decision-making
ThreatMiner is a threat intelligence portal that aggregates data from various sources and provides contextual information related to indicators of compromise (IOCs).
Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.
A free threat intelligence feed and banlist feed of known malicious IP addresses for public use only.