OpenCTI Add-On for Splunk
☆13Jan 13, 2026Updated 2 months ago
Alternatives and similar repositories for splunk-add-on
Users that are interested in splunk-add-on are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OpenCTI datasets☆34Nov 12, 2025Updated 4 months ago
- ☆15Aug 31, 2023Updated 2 years ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆34Apr 2, 2024Updated last year
- OpenCTI Python Client☆144Nov 13, 2025Updated 4 months ago
- OpenCTI Documentation Space☆26Dec 18, 2025Updated 3 months ago
- Intelligence-Led Cyber Attack Taxonomy, CAT☆11Aug 7, 2019Updated 6 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasi…☆39Apr 23, 2023Updated 2 years ago
- A simple LKM kernel space rootkit for v5.x linux with multiple functions.☆10Aug 13, 2020Updated 5 years ago
- TypeDB Driver for Node.js☆31Sep 27, 2023Updated 2 years ago
- OpenAEV Docker deployment helpers☆28Updated this week
- Proof of Concept for CVE-2025-24367☆34Dec 8, 2025Updated 3 months ago
- Wazuh extension looking up alert data against indicators in OpenCTI threat intel☆21Feb 4, 2024Updated 2 years ago
- OpenCTI Docker deployment helpers☆223Updated this week
- this is my stash of notes, cheatsheets and like anything i used or am using, as a compsci student in NUS☆20Aug 3, 2025Updated 7 months ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Updated this week
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- A minimal malware analysis sandbox for macOS☆34Feb 15, 2023Updated 3 years ago
- OpenCTI Connectors☆523Updated this week
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- ☆33Jun 12, 2024Updated last year
- Creates a malicious ODF document help leak NetNTLM Creds☆37Jul 12, 2023Updated 2 years ago
- Turn any blog into structured threat intelligence.☆54Updated this week
- Provides a method unix_time which returns elapsed time since UNIX EPOCH. The returned time can be faked in each thread separately.☆12May 19, 2021Updated 4 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Resources, tools and utilities about Threat Intelligence☆84Mar 18, 2023Updated 3 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- ☆16Dec 7, 2025Updated 3 months ago
- An Apple Silicon hooking library written in C☆13Sep 19, 2021Updated 4 years ago
- A simple macOS debugger detection trick☆19Apr 7, 2025Updated 11 months ago
- My work (including official solutions) for CS1101S: Programming Methodology☆20May 6, 2020Updated 5 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆60Mar 4, 2020Updated 6 years ago
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- FT3: Fraud Tools, Tactics, and Techniques Framework☆104Jul 28, 2025Updated 7 months ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago