GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web input into structured STIX 2.1 format.
☆24Mar 24, 2025Updated last year
Alternatives and similar repositories for GenAI-STIX2.1-Generator
Users that are interested in GenAI-STIX2.1-Generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆36Updated this week
- Everything related to YARA☆16Feb 19, 2026Updated last month
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Storage for the IOCs I collect☆11Apr 3, 2026Updated last week
- A labeled dataset used for the knowledge graph construction.☆34Nov 30, 2023Updated 2 years ago
- Python tool to inject DLLs into processes☆11Jun 29, 2017Updated 8 years ago
- External telegram feeder for AIL framework☆18Jan 21, 2026Updated 2 months ago
- ☆34Nov 11, 2025Updated 4 months ago
- Script fingerprinting systems based on shodan.io data☆13Jul 9, 2018Updated 7 years ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- Simple Chatbot for testing AI Red Team tooling☆17Feb 11, 2025Updated last year
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 10 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Turn any blog into structured threat intelligence.☆55Updated this week
- ☆23Dec 15, 2022Updated 3 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- An LLM for CTI reports - to be presented at FIRST Fukuoka 2024☆23Jan 26, 2026Updated 2 months ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- Threat Box Assessment Tool☆19Mar 5, 2026Updated last month
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Jan 29, 2024Updated 2 years ago
- Some YARA rules i will add from time to time☆67Mar 25, 2023Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- 🎇Vision: great List of Regex, Patterns, Google queries, public SPARQL, SQL, NoSQL - Regular Expressions(=Search Patterns=Data type defin…☆12Jul 9, 2025Updated 9 months ago
- ☆11Oct 13, 2020Updated 5 years ago
- ☆12Mar 28, 2026Updated last week
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- Wrap words to a specified length.☆12Apr 5, 2024Updated 2 years ago
- MODBUS Penetration Testing Framework☆11Mar 27, 2019Updated 7 years ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- Comment rebasing for IDA Pro☆27Apr 6, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Parsing UDP in Elixir with Binary Pattern Matching☆18Jun 5, 2020Updated 5 years ago
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 5 months ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆30Aug 21, 2023Updated 2 years ago
- BCP documents and website of GCVE☆56Mar 26, 2026Updated 2 weeks ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Jun 1, 2015Updated 10 years ago