mirror of
https://github.com/hslatman/awesome-threat-intelligence.git
synced 2024-12-20 19:36:12 +00:00
Merge pull request #63 from hslatman/hs_december_2016
Add APT & Cyber Criminal Campaign Collection
This commit is contained in:
commit
e06e10611a
@ -4,4 +4,4 @@ rvm:
|
|||||||
before_script:
|
before_script:
|
||||||
- gem install awesome_bot
|
- gem install awesome_bot
|
||||||
script:
|
script:
|
||||||
- awesome_bot README.md --white-list CONTRIBUTING.md,https://www.threatcrowd.org/,https://intel.deepviz.com/recap_network.php,https://www.fireeye.com/services/freeware/ioc-editor.html,https://www.threatconnect.com/wp-content/uploads/ThreatConnect-The-Diamond-Model-of-Intrusion-Analysis.pdf,http://www.dtic.mil/dtic/tr/fulltext/u2/a547092.pdf,http://www.dtic.mil/doctrine/new_pubs/jp2_0.pdf,http://www.amazon.com/Structured-Analytic-Techniques-Intelligence-Analysis/dp/1452241511,https://sslbl.abuse.ch/,https://soltra.com/,https://cryptome.org/2015/09/cti-guide.pdf,https://intel.criticalstack.com/,https://car.mitre.org/wiki/Main_Page,http://dx.doi.org/10.6028/NIST.SP.800-150,https://bitbucket.org/camp0/aiengine
|
- awesome_bot README.md --white-list CONTRIBUTING.md,https://www.threatcrowd.org/,https://intel.deepviz.com/recap_network.php,https://www.fireeye.com/services/freeware/ioc-editor.html,https://www.threatconnect.com/wp-content/uploads/ThreatConnect-The-Diamond-Model-of-Intrusion-Analysis.pdf,http://www.dtic.mil/dtic/tr/fulltext/u2/a547092.pdf,http://www.dtic.mil/doctrine/new_pubs/jp2_0.pdf,http://www.amazon.com/Structured-Analytic-Techniques-Intelligence-Analysis/dp/1452241511,https://sslbl.abuse.ch/,https://soltra.com/,https://cryptome.org/2015/09/cti-guide.pdf,https://intel.criticalstack.com/,https://car.mitre.org/wiki/Main_Page,http://dx.doi.org/10.6028/NIST.SP.800-150,https://bitbucket.org/camp0/aiengine,https://www.abuse.ch/
|
12
README.md
12
README.md
@ -37,7 +37,7 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="http://bgpranking.circl.lu/" target="_blank">BGP Ranking</a>
|
<a href="https://www.circl.lu/projects/bgpranking/" target="_blank">BGP Ranking</a>
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
Ranking of ASNs having the most malicious content.
|
Ranking of ASNs having the most malicious content.
|
||||||
@ -988,6 +988,14 @@ All kinds of tools for parsing, creating and editing Threat Intelligence. Mostly
|
|||||||
All kinds of reading material about Threat Intelligence. Includes (scientific) research and whitepapers.
|
All kinds of reading material about Threat Intelligence. Includes (scientific) research and whitepapers.
|
||||||
|
|
||||||
<table>
|
<table>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<a href="https://github.com/gasgas4/APT_CyberCriminal_Campaign" target="_blank">APT & Cyber Criminal Campaign Collection</a>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
Extensive collection of (historic) campaigns. Entries come from various sources.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="https://github.com/kbandla/APTnotes" target="_blank">APTnotes</a>
|
<a href="https://github.com/kbandla/APTnotes" target="_blank">APTnotes</a>
|
||||||
@ -1130,7 +1138,7 @@ All kinds of reading material about Threat Intelligence. Includes (scientific) r
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="https://www.cpni.gov.uk/Documents/Publications/2015/23-March-2015-MWR_Threat_Intelligence_whitepaper-2015.pdf" target="_blank">Threat Intelligence: Collecting, Analysing, Evaluating</a>
|
<a href="https://www.ncsc.gov.uk/content/files/protected_files/guidance_files/MWR_Threat_Intelligence_whitepaper-2015.pdf" target="_blank">Threat Intelligence: Collecting, Analysing, Evaluating</a>
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
This report by MWR InfoSecurity clearly describes several diffent types of threat intelligence, including strategic, tactical and operational variations. It also discusses the processes of requirements elicitation, collection, analysis, production and evaluation of threat intelligence. Also included are some quick wins and a maturity model for each of the types of threat intelligence defined by MWR InfoSecurity.
|
This report by MWR InfoSecurity clearly describes several diffent types of threat intelligence, including strategic, tactical and operational variations. It also discusses the processes of requirements elicitation, collection, analysis, production and evaluation of threat intelligence. Also included are some quick wins and a maturity model for each of the types of threat intelligence defined by MWR InfoSecurity.
|
||||||
|
Loading…
Reference in New Issue
Block a user