blackstork-io / fabric-templatesView external linksLinks
Open-source Fabric templates for cybersecurity and compliance
☆31Jan 13, 2025Updated last year
Alternatives and similar repositories for fabric-templates
Users that are interested in fabric-templates are comparing it to the libraries listed below
Sorting:
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆14Jan 24, 2024Updated 2 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- ☆23Mar 17, 2024Updated last year
- AIL project training materials☆39Jul 17, 2025Updated 7 months ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- ☆21Dec 22, 2021Updated 4 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- STIX2 graph visualisation library in JS☆95Feb 7, 2026Updated last week
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Apr 9, 2025Updated 10 months ago
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆59Jan 5, 2024Updated 2 years ago
- Cleanup of older MISP events can require some work until now☆27Sep 13, 2025Updated 5 months ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- ☆108Jun 2, 2024Updated last year
- ☆99Sep 16, 2022Updated 3 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆127Apr 6, 2024Updated last year
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Feb 4, 2026Updated last week
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Nov 9, 2022Updated 3 years ago
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Oct 21, 2025Updated 3 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆42Jan 20, 2026Updated 3 weeks ago
- ☆17Jan 22, 2026Updated 3 weeks ago
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated 3 weeks ago
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆91Updated this week
- Jupyter Notebooks for Cyber Threat Intelligence☆35Sep 14, 2023Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆46Jan 22, 2025Updated last year
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆45Oct 1, 2025Updated 4 months ago
- A Nagios plugin to monitor build time of Jenkins jobs☆15Jun 24, 2020Updated 5 years ago
- OpenPGP in Python using Sequoia PGP☆17Oct 9, 2025Updated 4 months ago
- Rapid Response sample Foundry app☆14Updated this week
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- Getting started with OpenTelemetry☆16Nov 9, 2022Updated 3 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆169Nov 10, 2023Updated 2 years ago
- TCAP implementation in Golang.☆45Jan 5, 2026Updated last month
- media.ccc.de media library application for webOS. Think of it as a Netflix for hackers☆15Jan 18, 2026Updated 3 weeks ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆10Aug 9, 2020Updated 5 years ago