aaronkaplan / cti-llm
An LLM for CTI reports - to be presented at FIRST Fukuoka 2024
☆18Updated last month
Alternatives and similar repositories for cti-llm:
Users that are interested in cti-llm are comparing it to the libraries listed below
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆53Updated this week
- ☆242Updated 3 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Updated last year
- ☆102Updated 2 weeks ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆239Updated last month
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆177Updated 7 months ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆13Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆46Updated 7 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆83Updated last year
- Harness the power of Splunk for your investigations☆99Updated 3 weeks ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆23Updated last year
- ☆29Updated last year
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆53Updated 2 years ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆236Updated last month
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆17Updated last year
- A yara based MCP Server☆11Updated this week
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆484Updated last month
- ☆104Updated 10 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆196Updated 9 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆111Updated 5 months ago
- Sample evtx files to use for testing hayabusa detection rules☆52Updated 5 months ago
- Augmentation to Machine Readable CTI☆31Updated last month
- Sigma rule specification☆132Updated last month
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆49Updated last week
- Advanced Threat Hunting: Ransomware Group☆20Updated 4 months ago
- Intelligence Architecture Mind Map☆130Updated last year
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆82Updated 4 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆162Updated last month
- ☆29Updated 3 weeks ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Updated last year