aaronkaplan / stochasticCTIExtractor
Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports
☆17Updated 10 months ago
Related projects: ⓘ
- Summarize CTI reports with OpenAI☆13Updated this week
- Augmentation to Machine Readable CTI☆25Updated this week
- A web scraper to create MISP events and reports☆14Updated last year
- An open source platform to support analysts to organise their case and tasks☆49Updated 2 weeks ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆15Updated 2 years ago
- A collection of tips for using MISP.☆74Updated 5 months ago
- ☆79Updated last month
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆47Updated this week
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆50Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆24Updated 9 months ago
- ☆14Updated this week
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆51Updated last week
- Cleanup of older MISP events can require some work until now☆22Updated last year
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆30Updated 2 years ago
- txt2stix is a Python script that is designed to identify and extract IoCs and TTPs from text files, identify the relationships between th…☆21Updated 2 weeks ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆21Updated 9 months ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆102Updated 3 weeks ago
- ☆25Updated 3 years ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆45Updated 3 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆86Updated 7 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆65Updated last month
- Remote access and Antivirus Logging Database☆39Updated 4 months ago
- A web application for generating, parsing and validating, manipulating, and visualizing CACAO v2.0 playbooks.☆21Updated 6 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆113Updated 9 months ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆49Updated 2 years ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆124Updated this week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆68Updated 9 months ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆31Updated last year
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- A pySigma wrapper to manage detection rules.☆16Updated last week