Start here!
How to create and manage your CTI?
About commercial CTI
Recommendations to conduct better analysis
Curated reports and writeups
Advanced Persistent Threats and IOCs
- Collection of APTs
- IOCs from Sophos Labs
- Malicious Network traffic
- Malpedia Library
- Threat Groups cards
Known artefacts left by the attacker
Tools for CTI activities
AMAaaS
sandboxapk analysisandroidsaas
anlyz.io
file analysisurl analysissaas
Any Run
sandboxsaas
Cortex (TheHive Project)
cyber threat intelligence
Crits
cyber threat intelligenceanalytics
fileintel
file analysiscyber threat intelligence
Firmware
file analysissaasfirmware
Gatewatcher Intelligence
artifact analysisfile analysismalware analysissaas
hostintel
cyber threat intelligencehost analysis
IBM X-Force
saasfile analysisurl analysisartifact search
Inquest Deep File Inspection (DFI)
file analysissaasdeobfuscation
Intezer
saassandboxmalware analysis
Joe Sandbox
sandboxsaas
Kaspersky Data Feeds
cyber threat intelligencefeed
Limacharlie
all-in-onesaaswindowsosxlinuxandroidiosforensics
Malware Information Sharing Platform (MISP)
cyber threat intelligence
Manalzyer
malware analysissaasstatic analysis framework
MetaDefender Cloud OPSWAT
saasfile analysisurl analysisartifact search
Munin
cyber threat intelligencefile analysis
OpenCTI
cyber threat intelligence
Pikker.ee Sandbox (Cuckoo)
sandboxmalware analysissaas
Quttera
saasurl analysis
SiteCheck Sucuri
saasurl analysis
T-Pot
honeypotcyber threat intelligence
threatnote.io
reportingcyber threat intelligence
Valkyrie Comodo
saasmalware analysis
VirusBay
malware exchangereporting
Yara
cyber threat intelligenceyara
Yomi
sandboxsaasmalware analysis