Ascend-Technologies / OpenCTI-HELM-CHART
☆15Updated last year
Alternatives and similar repositories for OpenCTI-HELM-CHART:
Users that are interested in OpenCTI-HELM-CHART are comparing it to the libraries listed below
- Firepit - STIX Columnar Storage☆16Updated 10 months ago
- Notes for High Availability MISP in AWS☆19Updated 5 years ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 2 years ago
- ☆42Updated last month
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆31Updated last year
- pocket guide for core detection engineering concepts☆28Updated last year
- Adversary Emulation Planner☆39Updated 9 months ago
- ☆27Updated 4 years ago
- ☆14Updated 11 months ago
- An open source platform to support analysts to organise their case and tasks☆71Updated this week
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆21Updated 7 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆45Updated last week
- OpenCTI datasets☆27Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 5 months ago
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆33Updated last year
- Command line tool for working with Panther rules and policies☆39Updated last week
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆27Updated 11 months ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆82Updated 4 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆51Updated last month
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆30Updated last month
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆53Updated last week
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- Posture Attribute Collection and Evaluation☆23Updated last year
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆27Updated last year
- This repo contains example of raw event examples and possible translations to the OCSF schema.☆36Updated 3 weeks ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆72Updated 2 weeks ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year