OpenCTI-Platform / datasets
OpenCTI datasets
☆21Updated 6 months ago
Related projects: ⓘ
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆29Updated 5 months ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆50Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆49Updated 2 years ago
- Strelka Web UI for File Submission and Analysis☆50Updated last month
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆33Updated 5 months ago
- ☆14Updated this week
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆24Updated 4 months ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆32Updated 2 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆47Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆41Updated 4 months ago
- ☆27Updated this week
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆22Updated 11 months ago
- Import Mitre Att&ck into Neo4j database☆32Updated last year
- A collection of Sigma rules organized by MITRE ATT&CK technique☆15Updated 3 years ago
- Automatic detection engineering technical state compliance☆49Updated 2 months ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆57Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 2 years ago
- pySigma Splunk backend☆33Updated 5 months ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆13Updated 3 months ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆47Updated this week
- Workflows for Shuffle☆20Updated last year
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆69Updated last week
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆29Updated last year
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆29Updated 8 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆76Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆74Updated 2 years ago