devops-ia / helm-openctiLinks
Helm chart for Open Cyber Threat Intelligence Platform
☆35Updated this week
Alternatives and similar repositories for helm-opencti
Users that are interested in helm-opencti are comparing it to the libraries listed below
Sorting:
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆62Updated this week
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Updated 3 years ago
- OpenAEV Docker deployment helpers☆26Updated 2 weeks ago
- Rules shared by the community from 100 Days of YARA 2025☆39Updated last week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- Repository of tools and resources for analyzing Docker containers☆71Updated 2 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Updated 2 years ago
- ☆101Updated 3 weeks ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆89Updated 2 months ago
- yara detection rules for hunting with the threathunting-keywords project☆157Updated 7 months ago
- Open-source Fabric templates for cybersecurity and compliance☆28Updated 11 months ago
- Collection of Dashboards for Threat Hunting and more!☆70Updated 5 years ago
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆64Updated 6 months ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆35Updated 9 months ago
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆27Updated 2 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆52Updated this week
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆51Updated 8 months ago
- OpenCTI Documentation Space☆26Updated 3 weeks ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆49Updated 6 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆107Updated 3 weeks ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆81Updated 6 months ago
- Turn any blog into structured threat intelligence.☆43Updated 2 weeks ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆33Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆57Updated 10 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆137Updated last month
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆40Updated 3 weeks ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆100Updated 2 weeks ago
- A collection of tips for using MISP.☆75Updated last year
- ☆18Updated last year