Starred repositories
Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we confi…
Cybersecurity AI (CAI), the framework for AI Security
A collection of 100+ specialized Claude Code subagents covering a wide range of development use cases
This directory contains materials to train humans & models to produce excellent intelligence analytical writing.
This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.
All the deals for InfoSec related software/tools this Black Friday
intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; including but not limited to CTI, MISP Threat Sharing, STIX 2.
This repository contain some datas about CVE's updated hourly, to help community Prioritize, based in sources the Threat Intelligence in Surface Web.
Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>
Open source templates you can use to bootstrap your security programs
A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry Needs, developed by those in trenches.
Cyber Threat Intelligence Repository expressed in STIX 2.0
Open Cyber Threat Intelligence Platform
TheHive is a Collaborative Case Management Platform, now distributed as a commercial version
⭐️ A curated list of awesome forensic analysis tools and resources
A curated list of tools for incident response
Collection of resources related to phishing
Custom search engines for Google Chrome
🏃💨 List of custom search engines & shortcuts to improve your daily workflow
An Open framework to rate the exposure of ip addresses with services exposed to the internet
Free hands-on digital forensics labs for students and faculty
Automate the creation of a lab environment complete with security tooling and logging best practices



