A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasible.
☆38Apr 23, 2023Updated 2 years ago
Alternatives and similar repositories for OpenCTI-Terraform
Users that are interested in OpenCTI-Terraform are comparing it to the libraries listed below
Sorting:
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆34Apr 2, 2024Updated last year
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆22Aug 13, 2024Updated last year
- Wazuh extension looking up alert data against indicators in OpenCTI threat intel☆21Feb 4, 2024Updated 2 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- Python Library for ConfigExtractor☆15Feb 24, 2026Updated last week
- ☆20Apr 10, 2025Updated 10 months ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- ☆15Aug 31, 2023Updated 2 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated last year
- ☆15May 26, 2021Updated 4 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- AIL project training materials☆39Feb 24, 2026Updated last week
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆43Jan 20, 2026Updated last month
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Jan 31, 2025Updated last year
- ☆20Feb 9, 2024Updated 2 years ago
- pan-stix☆19Oct 12, 2017Updated 8 years ago
- ☆18May 5, 2024Updated last year
- OpenAEV Docker deployment helpers☆28Feb 27, 2026Updated last week
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated 11 months ago
- ☆23Dec 15, 2022Updated 3 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Feb 23, 2026Updated last week
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Oct 5, 2025Updated 5 months ago
- Helm chart for Open Cyber Threat Intelligence Platform☆35Updated this week
- Webshell agent in aspx and php☆27Dec 11, 2025Updated 2 months ago
- OpenCTI datasets☆34Nov 12, 2025Updated 3 months ago
- Yet Another Memory Analyzer for malware detection and Guarding Operations with YARA and SIGMA☆81Nov 19, 2025Updated 3 months ago
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Feb 27, 2026Updated last week
- NDC Oslo 2019 slides and demos☆33Nov 26, 2020Updated 5 years ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- Security Content for the PEAK Threat Hunting Framework☆44Feb 15, 2024Updated 2 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Nov 9, 2022Updated 3 years ago
- Maco - Malware config extractor framework☆45Updated this week
- Defence Against the Dark Arts☆34Sep 15, 2019Updated 6 years ago