Ascend-Technologies / OpenCTI-HELM-CHARTLinks
☆15Updated 2 years ago
Alternatives and similar repositories for OpenCTI-HELM-CHART
Users that are interested in OpenCTI-HELM-CHART are comparing it to the libraries listed below
Sorting:
- Firepit - STIX Columnar Storage☆17Updated last year
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 3 years ago
- ☆52Updated 2 weeks ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated 2 years ago
- Notes for High Availability MISP in AWS☆19Updated 6 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14Updated last year
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆33Updated last year
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆59Updated 5 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- Adversary Emulation Planner☆42Updated last year
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 5 years ago
- OpenCTI datasets☆29Updated last month
- ☆30Updated 4 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated last week
- Command line tool for working with Panther rules and policies☆47Updated last week
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Updated 3 years ago
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.☆12Updated 11 months ago
- pocket guide for core detection engineering concepts☆31Updated 2 years ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Updated 2 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Updated 3 months ago
- A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasi…☆38Updated 2 years ago
- Augmentation to Machine Readable CTI☆37Updated 3 months ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆100Updated last week
- Posture Attribute Collection and Evaluation☆24Updated 2 years ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆36Updated 3 years ago
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆64Updated 5 months ago
- Rulezet is an open-source web platform for sharing, evaluating, improving, and managing cybersecurity detection rules (YARA, Sigma, Suric…☆35Updated last week
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Updated 3 years ago