Ascend-Technologies / OpenCTI-HELM-CHARTLinks
☆15Updated 2 years ago
Alternatives and similar repositories for OpenCTI-HELM-CHART
Users that are interested in OpenCTI-HELM-CHART are comparing it to the libraries listed below
Sorting:
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 3 years ago
- ☆47Updated 5 months ago
- Notes for High Availability MISP in AWS☆19Updated 5 years ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆31Updated last year
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated 10 months ago
- Firepit - STIX Columnar Storage☆16Updated last year
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆29Updated 2 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆13Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆55Updated last month
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated last year
- Adversary Emulation Planner☆41Updated last year
- Augmentation to Machine Readable CTI☆31Updated 4 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆55Updated this week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆48Updated last week
- Command line tool for working with Panther rules and policies☆41Updated last week
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- pocket guide for core detection engineering concepts☆30Updated 2 years ago
- A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasi…☆35Updated 2 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆22Updated 2 months ago
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆58Updated last month
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆162Updated last week
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆58Updated 3 years ago
- Global Security Database Tools☆44Updated last year
- ☆28Updated 4 years ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆78Updated last week
- OpenCTI datasets☆28Updated last year
- Workflows for Shuffle☆23Updated 2 years ago
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.☆11Updated 7 months ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆35Updated 2 years ago