☆20Apr 10, 2025Updated 10 months ago
Alternatives and similar repositories for otx-mcp
Users that are interested in otx-mcp are comparing it to the libraries listed below
Sorting:
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 8 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 2 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆51Jun 21, 2025Updated 8 months ago
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated 3 weeks ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆25Apr 30, 2025Updated 10 months ago
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- Phishing Reverse Proxy with MFA bypass☆17Jan 28, 2023Updated 3 years ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆23Aug 13, 2024Updated last year
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- ☆25Jan 4, 2023Updated 3 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network securit…☆30Apr 10, 2024Updated last year
- Helm chart for Open Cyber Threat Intelligence Platform☆35Mar 1, 2026Updated last week
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆64Feb 22, 2025Updated last year
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆112Jan 15, 2026Updated last month
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- Public release of Whalehoney Honeypot☆29Mar 21, 2022Updated 3 years ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆228Mar 28, 2025Updated 11 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆33Jul 23, 2024Updated last year
- A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasi…☆39Apr 23, 2023Updated 2 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆38Jun 12, 2024Updated last year
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆87Dec 14, 2025Updated 2 months ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆25Feb 23, 2026Updated 2 weeks ago
- AI Bill of Materials through source code scanning☆33Feb 25, 2026Updated last week
- A platform to automate and orchestrate security rules for governance, risk and compliance, and continuous assurance.☆37Feb 18, 2026Updated 2 weeks ago
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- ☆11Aug 31, 2019Updated 6 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- Living off the False Positive!☆42Jan 31, 2025Updated last year
- Python script implementing the favicon hash trick to find subdomains.☆39Mar 28, 2023Updated 2 years ago
- MCP Checkpoint continuously secures and monitors Model Context Protocol operations through static and dynamic scans, revealing hidden ris…☆111Feb 21, 2026Updated 2 weeks ago
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆42Jan 31, 2025Updated last year
- ☆42Nov 15, 2025Updated 3 months ago
- SOAPI - The OpenAPI Documentation Scanner☆39Feb 17, 2025Updated last year
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago