Ascend-Technologies / OpenCTI-HELM-CHART
☆15Updated last year
Alternatives and similar repositories for OpenCTI-HELM-CHART:
Users that are interested in OpenCTI-HELM-CHART are comparing it to the libraries listed below
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆31Updated 10 months ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 2 years ago
- ☆40Updated last month
- Firepit - STIX Columnar Storage☆16Updated 8 months ago
- pocket guide for core detection engineering concepts☆27Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆45Updated 3 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated 10 months ago
- Notes for High Availability MISP in AWS☆19Updated 5 years ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆25Updated last year
- A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasi…☆31Updated last year
- ☆12Updated 9 months ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆19Updated 5 months ago
- A Python implementation of the Community ID flow hashing standard☆23Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆44Updated 2 weeks ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆51Updated 2 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Updated 2 years ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆53Updated 2 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆60Updated 9 months ago
- This repo contains example of raw event examples and possible translations to the OCSF schema.☆36Updated 3 weeks ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆52Updated this week
- An open source platform to support analysts to organise their case and tasks☆65Updated this week
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆30Updated last year
- ☆101Updated 8 months ago
- OpenCTI datasets☆26Updated 11 months ago
- A CALDERA plugin☆74Updated 3 months ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- Adversary Emulation Planner☆38Updated 7 months ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆51Updated 2 months ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆34Updated 2 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated 2 weeks ago