devops-ia / helm-opencti
Helm chart for Open Cyber Threat Intelligence Platform
☆15Updated this week
Alternatives and similar repositories for helm-opencti:
Users that are interested in helm-opencti are comparing it to the libraries listed below
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated 7 months ago
- Can you pay the ransom in your country?☆13Updated last year
- Collection of videos of Raids on Cybercriminals☆18Updated 3 months ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated 8 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆72Updated this week
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆48Updated 6 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆13Updated 10 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- Simulates a compromise in a cloud and container environment☆32Updated last month
- Repository that contains a set of purposefully erroneous Yara rules.☆49Updated last year
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆37Updated 3 years ago
- ☆16Updated 2 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆27Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆32Updated last month
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated 10 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆55Updated last month
- Mapping of open-source detection rules and atomic tests.☆87Updated this week
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 7 months ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆24Updated last month
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆18Updated last year
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated last month
- Open YARA scan- and search engine☆20Updated last month
- ☆86Updated 5 months ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 3 years ago
- Repository of tools and resources for analyzing Docker containers☆62Updated last year