Karib0u / CTrag
A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.
☆21Updated 9 months ago
Alternatives and similar repositories for CTrag:
Users that are interested in CTrag are comparing it to the libraries listed below
- The core backend server handling API requests and task management☆33Updated 2 weeks ago
- Augmentation to Machine Readable CTI☆27Updated last month
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated last month
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- A home for detection content developed by the delivr.to team☆63Updated last month
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆39Updated 2 years ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆32Updated 2 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆24Updated 2 weeks ago
- Automatic detection engineering technical state compliance☆53Updated 6 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Updated 3 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆30Updated last year
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆22Updated last year
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆31Updated 2 years ago
- ☆41Updated 9 months ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- Adversary Emulation Planner☆38Updated 6 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆73Updated last year
- YARA rule analyzer to improve rule quality and performance☆95Updated 3 weeks ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated 11 months ago
- ☆86Updated 4 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆57Updated 2 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆16Updated 4 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆59Updated 2 years ago