GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web input into structured STIX 2.1 format.
☆24Mar 24, 2025Updated 11 months ago
Alternatives and similar repositories for GenAI-STIX2.1-Generator
Users that are interested in GenAI-STIX2.1-Generator are comparing it to the libraries listed below
Sorting:
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆34Updated this week
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- Storage for the IOCs I collect☆11Mar 26, 2025Updated 11 months ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Feb 4, 2026Updated 3 weeks ago
- ☆23Dec 15, 2022Updated 3 years ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 9 months ago
- Yet Another Memory Analyzer for malware detection and Guarding Operations with YARA and SIGMA☆81Nov 19, 2025Updated 3 months ago
- Comment rebasing for IDA Pro☆27Apr 6, 2020Updated 5 years ago
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- A labeled dataset used for the knowledge graph construction.☆35Nov 30, 2023Updated 2 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆28Aug 21, 2023Updated 2 years ago
- Azure function to insert MISP data in to Azure Sentinel☆34Oct 19, 2022Updated 3 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 2 years ago
- A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasi…☆38Apr 23, 2023Updated 2 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Nov 9, 2022Updated 3 years ago
- Turn any blog into structured threat intelligence.☆52Updated this week
- ☆34Nov 11, 2025Updated 3 months ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated last month
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- ☆11Feb 6, 2026Updated 3 weeks ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.☆41Feb 18, 2025Updated last year
- This is a repository to experiment with MCP for security☆47Jan 22, 2025Updated last year
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- Stay notified when new ads appear on Leboncoin☆81Feb 14, 2026Updated 2 weeks ago
- Library for extracting fields from Sigtran TCAP/INAP messages☆11Feb 17, 2026Updated last week
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- ☆10Aug 9, 2024Updated last year
- Pritunl Access Control System☆10Feb 16, 2023Updated 3 years ago
- Static analysis tool to Identify and Fix GitHub Actions prone to Supply‑Chain Risks☆14Dec 24, 2025Updated 2 months ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- Wrap words to a specified length.☆12Apr 5, 2024Updated last year
- Collect AWS logs and query them instantly with SQL! Open source CLI. No DB required.☆16Feb 10, 2026Updated 2 weeks ago
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 5 months ago
- Yara sort☆13Updated this week
- Temporal and Causal Relation extraction module for the Newsreader project.☆10Oct 26, 2015Updated 10 years ago