TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structured intelligence. Using the DeepSeek LLM, it extracts MITRE ATT&CK techniques, IOCs, threat actors, and generates contextual summaries.
☆51Jun 21, 2025Updated 8 months ago
Alternatives and similar repositories for TTPMapper
Users that are interested in TTPMapper are comparing it to the libraries listed below
Sorting:
- ☆20Apr 10, 2025Updated 10 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- IP address filter by City☆12Jan 17, 2025Updated last year
- ☆10Oct 25, 2020Updated 5 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Configurable, Community driven, HTTP C2 Profile☆27Feb 16, 2026Updated 2 weeks ago
- AI-Powered Threat Intelligence MCP tool☆32Jul 18, 2025Updated 7 months ago
- This repo contains workshop material delivered at #nullcon2020☆16Mar 6, 2020Updated 5 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Jan 23, 2026Updated last month
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆69Apr 30, 2024Updated last year
- Active Directory Purple Team Playbook☆116May 8, 2023Updated 2 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆23Jan 21, 2024Updated 2 years ago
- Detection Engineering Tools☆25Feb 26, 2026Updated last week
- abusing Process Hacker driver to terminate other processes (BYOVD)☆82May 23, 2023Updated 2 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- Malsys is a project designed to validate and analyze files for potential malware signatures.☆21Nov 5, 2023Updated 2 years ago
- ☆25Jan 4, 2023Updated 3 years ago
- ☆24Feb 1, 2025Updated last year
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Dec 2, 2024Updated last year
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆272Dec 15, 2025Updated 2 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆54Aug 12, 2025Updated 6 months ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆28Mar 13, 2024Updated last year
- Panoptes Endpoint Detection and Response Solution☆42Jan 19, 2026Updated last month
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 9 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- CARET - A tool for viewing cyber analytic relationships☆57Jan 15, 2020Updated 6 years ago
- ☆27Nov 7, 2023Updated 2 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Dec 11, 2020Updated 5 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- Advanced Threat Hunting: Ransomware Group☆29Jul 9, 2025Updated 7 months ago
- Mapping of open-source detection rules and atomic tests.☆202Feb 16, 2026Updated 2 weeks ago
- ☆11Feb 9, 2023Updated 3 years ago
- Event metadata collected across all manifest-based ETW providers on Window 10 1903☆32Nov 25, 2019Updated 6 years ago
- Evasive Payload Delivery Server & C2 Redirector☆112Nov 3, 2025Updated 4 months ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Feb 4, 2026Updated last month