devops-ia / helm-openctiLinks
Helm chart for Open Cyber Threat Intelligence Platform
☆28Updated last week
Alternatives and similar repositories for helm-opencti
Users that are interested in helm-opencti are comparing it to the libraries listed below
Sorting:
- OpenAEV Docker deployment helpers☆23Updated this week
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆28Updated 5 months ago
- ☆53Updated 3 weeks ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆58Updated 3 years ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆77Updated last month
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last week
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 4 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated 2 weeks ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆94Updated this week
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 3 months ago
- Daily updates from leaked data search engines, aggregators and similar services.☆111Updated this week
- OpenCTI Documentation Space☆24Updated last week
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- ☆21Updated 2 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆35Updated 7 months ago
- Short deep dive into Threat Hunting on AWS☆13Updated last year
- Repository of tools and resources for analyzing Docker containers☆68Updated last year
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆57Updated 2 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆27Updated 3 years ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆29Updated 8 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆57Updated this week
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆17Updated 2 months ago
- Collection of Dashboards for Threat Hunting and more!☆68Updated 4 years ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated 6 months ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆19Updated 11 months ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆50Updated last year
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆48Updated 4 months ago