devops-ia / helm-openctiLinks
Helm chart for Open Cyber Threat Intelligence Platform
☆35Updated this week
Alternatives and similar repositories for helm-opencti
Users that are interested in helm-opencti are comparing it to the libraries listed below
Sorting:
- OpenAEV Docker deployment helpers☆28Updated this week
- Short deep dive into Threat Hunting on AWS☆17Updated 2 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Updated 3 years ago
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆26Updated 3 months ago
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆67Updated 7 months ago
- ☆101Updated last month
- Import CrowdStrike Threat Intelligence into your instance of MISP☆50Updated 7 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 8 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆91Updated 3 months ago
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Updated this week
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆34Updated 10 months ago
- Rules shared by the community from 100 Days of YARA 2025☆38Updated last month
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- Rulezet is an open-source web platform for sharing, evaluating, improving, and managing cybersecurity detection rules (YARA, Sigma, Suric…☆41Updated this week
- An index of publicly available and open-source threat detection rulesets.☆131Updated 9 months ago
- A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasi…☆38Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated 2 months ago
- Open-source Fabric templates for cybersecurity and compliance☆31Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆109Updated 2 weeks ago
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆82Updated 8 months ago
- A MITRE ATT&CK Lookup Tool☆46Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Updated last year
- Turn any blog into structured threat intelligence.☆51Updated this week
- Mapping of open-source detection rules and atomic tests.☆193Updated last year
- ReWrite of AChoir in Go for Cross Platform forensic artifact collection and processing☆41Updated last week
- Finding ClickFix and FakeCAPTCHA like it's 1999☆121Updated this week
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆51Updated 9 months ago
- Repository of tools and resources for analyzing Docker containers☆72Updated 2 years ago