aaronkaplan / cti-llmLinks
An LLM for CTI reports - to be presented at FIRST Fukuoka 2024
☆20Updated last month
Alternatives and similar repositories for cti-llm
Users that are interested in cti-llm are comparing it to the libraries listed below
Sorting:
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆59Updated this week
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆254Updated 2 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆255Updated last month
- Harness the power of Splunk for your investigations☆107Updated this week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆87Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆17Updated last year
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆196Updated 11 months ago
- A yara based MCP Server☆13Updated this week
- A curated list of LLM driven Cyber security Resources☆30Updated this week
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆112Updated 6 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆183Updated 9 months ago
- A web application for generating, parsing and validating, manipulating, visualizing and executing CACAO v2.0 playbooks.☆31Updated 2 months ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆24Updated last year
- ☆92Updated 2 weeks ago
- Augmentation to Machine Readable CTI☆31Updated last month
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆21Updated this week
- ☆69Updated 2 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- ☆247Updated 4 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆165Updated this week
- ☆41Updated 5 months ago
- Intelligence Architecture Mind Map☆132Updated last year
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆496Updated last month
- Cyber Underground General Intelligence Requirements☆92Updated last year
- ☆104Updated last week
- Dettectinator - The Python library to your DeTT&CT YAML files.☆113Updated last month
- An opensource sigma conversion tool built using pysigma☆129Updated 5 months ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Updated 2 years ago