Karib0u / CTragLinks
A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.
☆23Updated last year
Alternatives and similar repositories for CTrag
Users that are interested in CTrag are comparing it to the libraries listed below
Sorting:
- The core backend server handling API requests and task management☆42Updated last week
- Augmentation to Machine Readable CTI☆31Updated last month
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated 2 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Updated 3 years ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- A home for detection content developed by the delivr.to team☆69Updated 3 weeks ago
- ☆92Updated last month
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆36Updated last week
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Updated 4 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆49Updated last year
- Summarize CTI reports with OpenAI☆16Updated this week
- YARA rule analyzer to improve rule quality and performance☆102Updated 2 months ago
- Python based CLI for MalwareBazaar☆37Updated 7 months ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆31Updated 2 years ago
- Cyber Threats Detection Rules☆14Updated last month
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 2 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Updated 3 years ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆89Updated last week
- Adversary Emulation Planner☆39Updated 11 months ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Updated 2 years ago
- Can you pay the ransom in your country?☆14Updated last year
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆44Updated 3 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆79Updated last month