devops-ia / helm-opencti
Helm chart for Open Cyber Threat Intelligence Platform
☆19Updated this week
Alternatives and similar repositories for helm-opencti:
Users that are interested in helm-opencti are comparing it to the libraries listed below
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆78Updated 2 weeks ago
- Repository of tools and resources for analyzing Docker containers☆65Updated last year
- pocket guide for core detection engineering concepts☆28Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆32Updated 3 months ago
- AI-Powered Dark Web OSINT Tool☆40Updated this week
- OpenBAS Docker deployment helpers☆18Updated this week
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated last month
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆72Updated 2 weeks ago
- An index of publicly available and open-source threat detection rulesets.☆44Updated last week
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 6 months ago
- ☆18Updated 4 months ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆31Updated last year
- CarbonBlack EDR detection rules and response actions☆71Updated 7 months ago
- ☆87Updated 2 months ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 5 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆27Updated this week
- ☆102Updated 2 weeks ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 4 months ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆44Updated last year
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆53Updated this week
- An open source platform to support analysts to organise their case and tasks☆71Updated this week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆126Updated 9 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆88Updated 5 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆62Updated this week
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated 10 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆120Updated last year
- Automate your SOC with SEKOIA.IO's Automation Library. Pull Requests are always welcome and highly appreciated!☆15Updated this week
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆14Updated last week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆83Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year