Intel Retrieval Augmented Generation (RAG) Utilities
☆90Jan 29, 2024Updated 2 years ago
Alternatives and similar repositories for IntelRAGU
Users that are interested in IntelRAGU are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆108Jun 2, 2024Updated last year
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 4 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆80Apr 17, 2026Updated 2 weeks ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- source code for the offsecml framework☆44Jun 6, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Augmentation to Machine Readable CTI☆38Apr 22, 2026Updated last week
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Apr 21, 2026Updated last week
- A curated list of Awesome Threat Intelligence Blogs☆540Apr 27, 2026Updated last week
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆37Oct 21, 2025Updated 6 months ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆13Dec 21, 2024Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆130Apr 6, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆37Mar 24, 2025Updated last year
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆44Jan 20, 2026Updated 3 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆170Nov 10, 2023Updated 2 years ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated last year
- MCP Server that integrates with Security Copilot, Sentinel and other tools (in the future). It enhance the process of developing , testin…☆23Oct 8, 2025Updated 6 months ago
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆205Jul 3, 2024Updated last year
- Threat Box Assessment Tool☆19Mar 5, 2026Updated last month
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated last year
- OSED Practice binary☆26Nov 23, 2023Updated 2 years ago
- Enumerate Location Services using CoreLocation API on macOS☆18Dec 2, 2021Updated 4 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Microsoft Threat Intelligence Security Tools☆1,964Updated this week
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆288Mar 20, 2025Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆120Jul 15, 2023Updated 2 years ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 4 months ago
- A collection of methods to learn who the owner of an IP address is.☆233Sep 29, 2025Updated 7 months ago
- ☆12Mar 28, 2026Updated last month
- The samples referenced in my book, Evasive Malware (No starch Press)☆60Feb 20, 2026Updated 2 months ago