devops-ia / helm-openctiLinks
Helm chart for Open Cyber Threat Intelligence Platform
☆20Updated this week
Alternatives and similar repositories for helm-opencti
Users that are interested in helm-opencti are comparing it to the libraries listed below
Sorting:
- pocket guide for core detection engineering concepts☆28Updated 2 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆81Updated 2 weeks ago
- ☆92Updated 3 weeks ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆74Updated last week
- Anvilogic Forge☆103Updated last week
- OpenBAS Docker deployment helpers☆18Updated this week
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆57Updated 3 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆59Updated last week
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- Automate your SOC with SEKOIA.IO's Automation Library. Pull Requests are always welcome and highly appreciated!☆16Updated this week
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆124Updated last week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆87Updated last year
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 7 months ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆21Updated this week
- Convert Sigma rules to SIEM queries, directly in your browser.☆81Updated this week
- NOVA: The Prompt Pattern Matching☆114Updated last month
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆78Updated last week
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆45Updated this week
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- Mapping of open-source detection rules and atomic tests.☆166Updated 4 months ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆51Updated last month
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆91Updated 7 months ago
- Open-source Fabric templates for cybersecurity and compliance☆20Updated 4 months ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆74Updated last year
- An index of publicly available and open-source threat detection rulesets.☆112Updated last month
- Turn any blog into structured threat intelligence.☆32Updated this week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆97Updated last year
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆20Updated last week
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated 2 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆165Updated 7 months ago