blackstork-io / fabric
An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as-Code
☆34Updated this week
Related projects ⓘ
Alternatives and complementary repositories for fabric
- An open source platform to support analysts to organise their case and tasks☆55Updated this week
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆26Updated this week
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆50Updated this week
- ☆83Updated 3 months ago
- Firepit - STIX Columnar Storage☆15Updated 5 months ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆58Updated this week
- A collection of tips for using MISP.☆74Updated 7 months ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆15Updated 2 years ago
- ☆27Updated 3 years ago
- A community event for security researchers to share their favorite notebooks☆106Updated 9 months ago
- Augmentation to Machine Readable CTI☆25Updated 2 months ago
- pocket guide for core detection engineering concepts☆27Updated last year
- Open-source Fabric templates for cybersecurity and compliance☆13Updated 3 months ago
- Converting data from services like Censys and Shodan to a common data model☆48Updated 2 months ago
- JSON schemas for validating CACAO Security Playbooks. Note: In December 2023, Cyentific AS offered and transferred the content of this re…☆18Updated 11 months ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆84Updated this week
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆66Updated last week
- A tool that allows you to document and assess any security automation in your SOC☆43Updated 3 weeks ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆115Updated 11 months ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆125Updated last year
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated 2 months ago
- Recon Hunt Queries☆75Updated 3 years ago
- OSSEM Common Data Model☆54Updated 2 years ago
- A pure Go library for working with Structured Threat Information Expression (STIX™) version 2.x data☆23Updated last month
- ☆31Updated last month
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Updated 7 months ago