AI-powered tool designed to help producing Threat Intelligence Mindmap.
☆108Feb 16, 2026Updated last month
Alternatives and similar repositories for TI-Mindmap-GPT
Users that are interested in TI-Mindmap-GPT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆108Jun 2, 2024Updated last year
- LLM Agent Skill for YARA rule authoring and review☆39Feb 8, 2026Updated 2 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆133Oct 17, 2020Updated 5 years ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated last year
- ☆44Jul 11, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- yara detection rules for hunting with the threathunting-keywords project☆159May 11, 2025Updated 11 months ago
- A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-system…☆28Aug 26, 2023Updated 2 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 10 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆16Mar 6, 2026Updated last month
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Aug 13, 2024Updated last year
- PowerShell Digital Forensics & Incident Response Scripts.☆781Jan 14, 2026Updated 3 months ago
- Capture. Detonate. Collect☆14Sep 20, 2024Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆130Apr 6, 2024Updated 2 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆68Oct 2, 2023Updated 2 years ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆19Jul 19, 2024Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123May 16, 2023Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- ☆108Dec 9, 2025Updated 4 months ago
- TAPIR is a multi-user, client/server, incident response framework☆47Jul 7, 2022Updated 3 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆10Dec 8, 2022Updated 3 years ago
- MDE Tester is designed to help testing various features in Microsoft Defender for Endpoint.☆194Feb 20, 2026Updated last month
- Live Feed of C2 servers, tools, and botnets☆766Apr 6, 2026Updated last week
- MCP server for VirusTotal API — analyze URLs, files, IPs, and domains with comprehensive security reports, relationship analysis, and pag…☆117Mar 31, 2026Updated 2 weeks ago
- ☆20Apr 10, 2025Updated last year
- python wrapper for the nfdump cli application☆21Apr 8, 2021Updated 5 years ago
- ☆16Nov 27, 2023Updated 2 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆202Jul 3, 2024Updated last year
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆36Mar 24, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- MISP Playbooks☆224Oct 14, 2025Updated 6 months ago
- ☆18Sep 13, 2021Updated 4 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆25Aug 7, 2024Updated last year
- Sniffing out well-known threat groups☆64Aug 13, 2024Updated last year
- Automating Security Detection Engineering, published by Packt☆67Oct 12, 2024Updated last year
- Remotely collect linux live forensics artifacts.☆14Jul 8, 2022Updated 3 years ago
- Summarize CTI reports with OpenAI☆18Apr 7, 2026Updated last week