AI-powered tool designed to help producing Threat Intelligence Mindmap.
☆108Feb 16, 2026Updated last month
Alternatives and similar repositories for TI-Mindmap-GPT
Users that are interested in TI-Mindmap-GPT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆108Jun 2, 2024Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆132Oct 17, 2020Updated 5 years ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆157May 11, 2025Updated 10 months ago
- Script to chain search parameters for MalwareBazaar☆13Jan 26, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆44Jul 11, 2025Updated 8 months ago
- A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-system…☆28Aug 26, 2023Updated 2 years ago
- suricata-check is a command line utility to provide feedback on Suricata rules. The tool can detect various issues including those coveri…☆20Nov 21, 2025Updated 4 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Aug 13, 2024Updated last year
- PowerShell Digital Forensics & Incident Response Scripts.☆777Jan 14, 2026Updated 2 months ago
- Capture. Detonate. Collect☆14Sep 20, 2024Updated last year
- Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack, Telegram, Discord, PushOver and/or MS Teams.☆19Dec 12, 2024Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆130Apr 6, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆68Oct 2, 2023Updated 2 years ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆19Jul 19, 2024Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124May 16, 2023Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- ☆107Dec 9, 2025Updated 3 months ago
- TAPIR is a multi-user, client/server, incident response framework☆47Jul 7, 2022Updated 3 years ago
- A simple chat application that integrates Microsoft Entra ID for user authentication. Designed for deployment on Azure Container Apps wit…☆20Feb 21, 2026Updated last month
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- ☆10Dec 8, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- MDE Tester is designed to help testing various features in Microsoft Defender for Endpoint.☆193Feb 20, 2026Updated last month
- Live Feed of C2 servers, tools, and botnets☆760Updated this week
- ☆20Apr 10, 2025Updated 11 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆202Jul 3, 2024Updated last year
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆36Mar 24, 2025Updated last year
- MISP Playbooks☆223Oct 14, 2025Updated 5 months ago
- Sniffing out well-known threat groups☆64Aug 13, 2024Updated last year
- Automating Security Detection Engineering, published by Packt☆67Oct 12, 2024Updated last year
- Remotely collect linux live forensics artifacts.☆14Jul 8, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- The intake formats supported by SEKOIA.IO☆19Updated this week
- Summarize CTI reports with OpenAI☆18Mar 16, 2026Updated last week
- AI-Powered Threat Intelligence MCP tool☆33Jul 18, 2025Updated 8 months ago
- ☆26Jun 2, 2023Updated 2 years ago
- This is a repository to experiment with MCP for security☆47Jan 22, 2025Updated last year
- 🤖 Admyral enables continuous control monitoring for any custom control☆339Nov 27, 2024Updated last year
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 9 months ago