QinetiQ-Cyber-Intelligence / OpenCTI-TerraformLinks
A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasible.
☆37Updated 2 years ago
Alternatives and similar repositories for OpenCTI-Terraform
Users that are interested in OpenCTI-Terraform are comparing it to the libraries listed below
Sorting:
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆33Updated last year
- Automatic detection engineering technical state compliance☆55Updated last year
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 6 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 6 months ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Updated 3 years ago
- ☆19Updated 3 years ago
- Turn any blog into structured threat intelligence.☆41Updated this week
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Updated 4 months ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- This repository contains generated contextual data utilized by pyattck.☆19Updated 8 months ago
- Workflows for Shuffle☆24Updated 3 years ago
- Helm chart for Open Cyber Threat Intelligence Platform☆32Updated last week
- A home for detection content developed by the delivr.to team☆73Updated 3 months ago
- Library of threat hunts to get any user started!☆45Updated 5 years ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆48Updated 3 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆68Updated last year
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 3 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- ☆44Updated 4 months ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆51Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- Stupid Simple Detection Testing☆13Updated last year
- Public release of Whalehoney Honeypot☆29Updated 3 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆59Updated 3 years ago
- A CALDERA plugin☆79Updated last month
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated 3 weeks ago
- Repository that contains a set of purposefully erroneous Yara rules.☆60Updated 3 months ago
- Repository of tools and resources for analyzing Docker containers☆71Updated 2 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆89Updated 2 years ago
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆16Updated last week