Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc
-
Updated
Dec 4, 2025
Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc
Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨
Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.
Automating Cyber Threat Intelligence Reporting with Natural Language Generation
Dataset Release on our paper, Threat Behavior Textual Search by Attention Graph Ismorphism
Open-source cyber threat intelligence reports: evidence-labeled assessments, SOC-oriented guidance, and defensive research. PDF and HTML with table of contents and working reference links. Handala Hack Group, Sandworm/APT44. By Andrey Pautov (@1200km). Long-form articles on Medium.
*the-stix-intern* a minimalistic framework for the automized extraction of CTI from unstructured texts
Provide Rust-based MISP data models with full attribute support and bidirectional STIX 2.1 conversion for threat intelligence workflows.
Add a description, image, and links to the threat-reports topic page so that developers can more easily learn about it.
To associate your repository with the threat-reports topic, visit your repo's landing page and select "manage topics."