Karib0u / CTragLinks
A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.
☆23Updated last year
Alternatives and similar repositories for CTrag
Users that are interested in CTrag are comparing it to the libraries listed below
Sorting:
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated 2 months ago
- The core backend server handling API requests and task management☆43Updated 3 weeks ago
- ☆92Updated 2 months ago
- A collection of tips for using MISP.☆74Updated 7 months ago
- An open source platform to support analysts to organise their case and tasks☆87Updated last week
- Augmentation to Machine Readable CTI☆31Updated 2 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- YARA rule analyzer to improve rule quality and performance☆102Updated 3 months ago
- JPCERT/CC public YARA rules repository☆110Updated 7 months ago
- pySigma Splunk backend☆40Updated 2 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆82Updated last month
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆55Updated this week
- simple webapp for converting sigma rules into siem queries using the pySigma library☆49Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 7 months ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- Cyber Threats Detection Rules☆14Updated last month
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆25Updated last year
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆104Updated 2 months ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Updated 3 years ago
- Cyber Underground General Intelligence Requirements☆94Updated last year
- Because phishtank was taken.. explore phishing kits in a contained environment!☆47Updated 3 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago
- Summarize CTI reports with OpenAI☆16Updated 2 weeks ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆31Updated 2 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆89Updated 3 weeks ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 2 years ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Updated 3 years ago