A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.
☆33Apr 1, 2024Updated 2 years ago
Alternatives and similar repositories for CTrag
Users that are interested in CTrag are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆80Apr 17, 2026Updated 2 weeks ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- Splunk Add-on for PowerShell provides field extraction for PowerShell event logs.☆17Feb 1, 2021Updated 5 years ago
- Open-source Fabric templates for cybersecurity and compliance☆32Jan 13, 2025Updated last year
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- ☆19Jul 21, 2022Updated 3 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 11 months ago
- The open ransomware payment tracker☆102Aug 29, 2025Updated 8 months ago
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Mar 19, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A course in numerical methods with Python for engineers and scientists: currently 5 learning modules, with student assignments.☆10Dec 6, 2017Updated 8 years ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Apr 21, 2026Updated last week
- ☆109Dec 9, 2025Updated 4 months ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- NHS Hack Day website☆13Apr 25, 2026Updated last week
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆37Mar 24, 2025Updated last year
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆28Aug 17, 2021Updated 4 years ago
- A collection of my yara rules☆34Jul 11, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- Suricata JSON schema project☆12Jan 5, 2020Updated 6 years ago
- STIX2 graph visualisation library in JS☆98Feb 7, 2026Updated 2 months ago
- ☆59Oct 12, 2024Updated last year
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- Hfinger - fingerprinting HTTP requests☆142May 16, 2023Updated 2 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Sep 14, 2023Updated 2 years ago
- Augmentation to Machine Readable CTI☆38Apr 22, 2026Updated last week
- This project aims to fine-tune a pre-trained LLM using CTI-specific data and evaluate its performance with CTIBench, a benchmark designed…☆19Sep 5, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- A Google App Engine application to archive the posts from Hacker News☆16Jun 3, 2018Updated 7 years ago
- ☆11Aug 28, 2024Updated last year
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Feb 21, 2024Updated 2 years ago
- Lazy use of the Ruff formatter/linter for Python code blocks, regions and buffers in Emacs.☆16Oct 30, 2025Updated 6 months ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆44Jan 20, 2026Updated 3 months ago