📒
Book of VanLuong
search
⌘Ctrlk
📒
Book of VanLuong
  • 👨‍💻About the Author
  • Cryptography
    • Cryptanalysis
  • C2
    • Practical with Havoc Framework
  • Blue Teaming
    • SIEM & SOC
    • SIEM Tools
    • PowerShell in Incident Response and Threat Hunting
  • Techniques used in malware
  • Wazuh App Dashboards for Splunkarrow-up-right
  • Cyber Threat Intelligence
    • OpenCTI
      • OpenCTI Overview
      • OpenCTI Installtion
      • OpenCTI Connectors
      • OpenCTI integration with SIEM (Splunk)
      • Enrich IOC using SOAR with OpenCTI, VirusTotal and Shuffler
  • Windows
  • Guide to Installing Kali Linux, DVWA, and bWAPP
  • CTF
    • CTF-writeup-in-KCSCarrow-up-right
  • Red Teaming
    • Active Directory
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Cyber Threat Intelligence

OpenCTI

OpenCTI Overviewchevron-rightOpenCTI Installtionchevron-rightOpenCTI Connectorschevron-rightOpenCTI integration with SIEM (Splunk)chevron-rightEnrich IOC using SOAR with OpenCTI, VirusTotal and Shufflerchevron-right
PreviousCyber Threat Intelligencechevron-leftNextOpenCTI Overviewchevron-right