Git Product home page Git Product logo

open-source-tools-for-cti's Introduction

Opensource-tools

Welcome, this is a repository of opensource tools that I have found interesting and usefull over the years.

Please feel free to check out my blog too: https://bushidotoken.net and follow me on Twitter: @BushidoToken

Index ℹ️

This repoisitory of resources has been organized to categorize topics into different areas to benefit different types of cyber threat intelligence jobs and tasks. While all three types of intelligence are essential for effective decision-making, they differ in their focus, scope, timeframe, and intended users, reflecting the hierarchical levels and operational requirements of the organization or military command.

Resources for Strategic Intelligence Requirements

Strategic intelligence focuses on long-term planning and decision-making at the highest levels of an organization. It deals with broad, overarching issues that have significant implications for the organization's overall objectives and interests.

Resources for Operational Intelligence Requirements

Operational intelligence focuses on medium-term planning and decision-making, primarily at the operational level of an organization. It deals with issues related to the execution of specific missions or tasks.

Resources for Tactical Intelligence Requirements

Tactical intelligence focuses on short-term decision-making and execution of specific actions on in the cyber domain. It deals with immediate threats and other tactical considerations.

Resources for Auxillary CTI enablement

InfoSec Community Resources

Acknowledgments

  • Members of the Community who recommended tools to me:
n14 @olihough86 @JCyberSec_ @Rag_Sec @BufferOfStyx @CybersecStu @ScottMcGready @TJ_Null @ZephrFish

open-source-tools-for-cti's People

Contributors

apurvsinghgautam avatar beyzadp avatar bushidouk avatar hudsonrock-partnerships avatar itpropaul avatar zephrfish avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

open-source-tools-for-cti's Issues

Consider adding Hudson Rock cybercrime intelligence tools

Hudson Rock has awesome free tools that don't require registration and can indicate if a specific digital asset was compromised in a global Infostelaers attack. We would be happy if you could share this toolset with your community.

Our tools include -

Domain - Search for Compromised Corporate & Supply Chain Infrastructure (Discover whether your, or your vendor’s corporate infrastructure has been compromised by Infostealers)

Email Address - Search for Compromised Employees, Customers, Users & Partners (Search specific email addresses to find out if your employees, customers, users or partners have been compromised by info-stealing malware)

Android App - Search for Compromised Android App Users (Find out whether users of your Android app have had their credentials compromised)

Technology Profiler - Discover which Companies are Using a Technology (Citrix, Webmail, Confluence, etc).

Password Hygiene - Discover the password hygiene in any company, search any domain to discover if password complexity requirements are implemented based on actual exposed credentials.

They are all available here: https://www.hudsonrock.com/free-tools
Learn more about what Infostealers are: https://www.infostealers.com/

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.