Small web frontend for using openAI's GPT-3.5 and GPT-4's API
☆59Apr 9, 2025Updated last year
Alternatives and similar repositories for openai-cti-summarizer
Users that are interested in openai-cti-summarizer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- Summarize CTI reports with OpenAI☆18Updated this week
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- Golang implementation of PyMISP-feedgenerator☆18Jul 31, 2022Updated 3 years ago
- AIL project training materials☆39Apr 21, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- ☆23Mar 17, 2024Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- Website for ail-typo-squatting library☆73Feb 25, 2026Updated 2 months ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- service to convert nfcapd files clickhouse as they are created☆10Mar 22, 2025Updated last year
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆170Nov 10, 2023Updated 2 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆34Jan 1, 2023Updated 3 years ago
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 5 months ago
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- Capture a URL with Playwright☆31Apr 29, 2026Updated last week
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆54Oct 23, 2024Updated last year
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Apr 18, 2026Updated 3 weeks ago
- An open source platform to support analysts to organise their case and tasks☆135Updated this week
- Open-source Fabric templates for cybersecurity and compliance☆32Jan 13, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A web application for generating, parsing and validating, manipulating, visualizing and executing CACAO v2.0 playbooks.☆40Aug 27, 2025Updated 8 months ago
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated 2 years ago
- Public Chronicle Detection Rules☆12Apr 25, 2023Updated 3 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Dec 18, 2024Updated last year
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆78Apr 4, 2025Updated last year
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- Check security aspects of a second-level domain name.☆18May 31, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated last year
- Yara rules☆21Mar 27, 2023Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Threat Intel Platform for T-POTs☆198Updated this week
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆47Oct 1, 2025Updated 7 months ago
- Python based CLI for MalwareBazaar☆39Jul 22, 2025Updated 9 months ago