devops-ia / helm-opencti
Helm chart for Open Cyber Threat Intelligence Platform
☆19Updated this week
Alternatives and similar repositories for helm-opencti:
Users that are interested in helm-opencti are comparing it to the libraries listed below
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆78Updated this week
- pocket guide for core detection engineering concepts☆28Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆31Updated 2 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆50Updated last year
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆70Updated 10 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆65Updated last week
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 5 months ago
- Repository of tools and resources for analyzing Docker containers☆64Updated last year
- Workflows for Shuffle☆21Updated 2 years ago
- Anvilogic Forge☆95Updated last week
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆102Updated 6 months ago
- A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasi…☆31Updated last year
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆31Updated last year
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆37Updated 2 weeks ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 3 months ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆76Updated 4 months ago
- Open-source Fabric templates for cybersecurity and compliance☆16Updated 2 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆91Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆70Updated last week
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated 9 months ago
- Elastic version of SOC prime watcher rules☆29Updated 5 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆26Updated 2 weeks ago
- Notes on managing and coordinating the response to major cyber incidents☆40Updated 4 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated last week
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆55Updated 3 years ago
- Mapping of open-source detection rules and atomic tests.☆159Updated 2 months ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 8 months ago
- Baseline a Windows System against LOLBAS☆26Updated 11 months ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆51Updated this week