Ascend-Technologies / OpenCTI-HELM-CHARTLinks
β15Updated 2 years ago
Alternatives and similar repositories for OpenCTI-HELM-CHART
Users that are interested in OpenCTI-HELM-CHART are comparing it to the libraries listed below
Sorting:
- Adversary Emulation Plannerβ42Updated last year
- π»ββοΈ πΉ Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.β13Updated last year
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that maβ¦β16Updated 3 years ago
- Firepit - STIX Columnar Storageβ16Updated last year
- Notes for High Availability MISP in AWSβ19Updated 5 years ago
- β50Updated 3 weeks ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCPβ33Updated last year
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-rβ¦β23Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/cβ¦β42Updated last year
- β28Updated 4 years ago
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-asβ¦β61Updated 3 months ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practicesβ57Updated 2 months ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.β29Updated 2 years ago
- pocket guide for core detection engineering conceptsβ30Updated 2 years ago
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.β12Updated 8 months ago
- Augmentation to Machine Readable CTIβ34Updated last month
- SOARCA - The Open Source CACAO-based Security Orchestrator!β83Updated last month
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.β59Updated 3 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formatsβ55Updated this week
- Synthetic Adversarial Log Objects: A Framework for synthentic log generationβ85Updated last year
- An open source platform to support analysts to organise their case and tasksβ107Updated last week
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)β33Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users inβ¦β31Updated last month
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each techniqueβ67Updated last year
- List of Awesome Vertex Synapse Resourcesβ28Updated last year
- OSSEM Common Data Modelβ56Updated 3 years ago
- OCA-wide documentation shared by all sub-projects and repositoriesβ33Updated 11 months ago
- β49Updated 2 weeks ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromiseβ66Updated last year
- Global Security Database Toolsβ43Updated last year