GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web input into structured STIX 2.1 format.
☆24Mar 24, 2025Updated 11 months ago
Alternatives and similar repositories for GenAI-STIX2.1-Generator
Users that are interested in GenAI-STIX2.1-Generator are comparing it to the libraries listed below
Sorting:
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆35Updated this week
- Everything related to YARA☆16Feb 19, 2026Updated last month
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- ☆36Jan 27, 2026Updated last month
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Updated this week
- Storage for the IOCs I collect☆11Mar 26, 2025Updated 11 months ago
- A labeled dataset used for the knowledge graph construction.☆34Nov 30, 2023Updated 2 years ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 10 months ago
- External telegram feeder for AIL framework☆18Jan 21, 2026Updated 2 months ago
- ☆34Nov 11, 2025Updated 4 months ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- Simple Chatbot for testing AI Red Team tooling☆17Feb 11, 2025Updated last year
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 10 months ago
- Turn any blog into structured threat intelligence.☆54Updated this week
- ☆23Dec 15, 2022Updated 3 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- An LLM for CTI reports - to be presented at FIRST Fukuoka 2024☆23Jan 26, 2026Updated last month
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 weeks ago
- Some YARA rules i will add from time to time☆67Mar 25, 2023Updated 2 years ago
- 🎇Vision: great List of Regex, Patterns, Google queries, public SPARQL, SQL, NoSQL - Regular Expressions(=Search Patterns=Data type defin…☆12Jul 9, 2025Updated 8 months ago
- ☆12Updated this week
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- Wrap words to a specified length.☆12Apr 5, 2024Updated last year
- MODBUS Penetration Testing Framework☆11Mar 27, 2019Updated 6 years ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- Golang C2 Client + PHP API Handler☆13Aug 1, 2023Updated 2 years ago
- Parsing UDP in Elixir with Binary Pattern Matching☆18Jun 5, 2020Updated 5 years ago
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 4 months ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆29Aug 21, 2023Updated 2 years ago
- BCP documents and website of GCVE☆56Updated this week
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Jun 1, 2015Updated 10 years ago
- This is a repository to experiment with MCP for security☆47Jan 22, 2025Updated last year
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 2 years ago
- A web application for generating, parsing and validating, manipulating, visualizing and executing CACAO v2.0 playbooks.☆39Aug 27, 2025Updated 6 months ago
- Autonomous Assumed Breach Penetration-Testing Active Directory Networks☆42Mar 3, 2026Updated 2 weeks ago