Ascend-Technologies / OpenCTI-HELM-CHARTLinks
☆15Updated 2 years ago
Alternatives and similar repositories for OpenCTI-HELM-CHART
Users that are interested in OpenCTI-HELM-CHART are comparing it to the libraries listed below
Sorting:
- Firepit - STIX Columnar Storage☆17Updated last year
- ☆52Updated 2 months ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 3 years ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆33Updated last year
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14Updated last year
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated 2 years ago
- Notes for High Availability MISP in AWS☆19Updated 6 years ago
- ☆29Updated 4 years ago
- Global Security Database Tools☆43Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆59Updated 4 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated this week
- Augmentation to Machine Readable CTI☆37Updated 3 months ago
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.☆12Updated 10 months ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated last week
- pocket guide for core detection engineering concepts☆31Updated 2 years ago
- Posture Attribute Collection and Evaluation☆24Updated 2 years ago
- Adversary Emulation Planner☆42Updated last year
- Command line tool for working with Panther rules and policies☆46Updated this week
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- Workflows for Shuffle☆24Updated 3 years ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆29Updated 2 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆50Updated last week
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Updated 5 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆69Updated last year
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 5 years ago
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆64Updated 5 months ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆100Updated 3 months ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆148Updated 5 months ago