mrwadams / otx-mcpView external linksLinks
☆20Apr 10, 2025Updated 10 months ago
Alternatives and similar repositories for otx-mcp
Users that are interested in otx-mcp are comparing it to the libraries listed below
Sorting:
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 8 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 2 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆49Jun 21, 2025Updated 7 months ago
- Configurable, Community driven, HTTP C2 Profile☆27May 30, 2025Updated 8 months ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆24Apr 30, 2025Updated 9 months ago
- Phishing Reverse Proxy with MFA bypass☆17Jan 28, 2023Updated 3 years ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆22Aug 13, 2024Updated last year
- Various AD tools needed for penetration testing in one place.☆24Jul 13, 2023Updated 2 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- ☆25Jan 4, 2023Updated 3 years ago
- This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network securit…☆30Apr 10, 2024Updated last year
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- Helm chart for Open Cyber Threat Intelligence Platform☆35Updated this week
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆64Feb 22, 2025Updated 11 months ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆112Jan 15, 2026Updated last month
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- Public release of Whalehoney Honeypot☆29Mar 21, 2022Updated 3 years ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆226Mar 28, 2025Updated 10 months ago
- A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasi…☆38Apr 23, 2023Updated 2 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆33Jul 23, 2024Updated last year
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆38Jun 12, 2024Updated last year
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆86Dec 14, 2025Updated 2 months ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- ☆11Aug 31, 2019Updated 6 years ago
- Living off the False Positive!☆41Jan 31, 2025Updated last year
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆25Nov 17, 2024Updated last year
- Python script implementing the favicon hash trick to find subdomains.☆38Mar 28, 2023Updated 2 years ago
- A platform to automate and orchestrate security rules for governance, risk and compliance, and continuous assurance.☆37Updated this week
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Jan 31, 2025Updated last year
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 4 years ago
- MCP Checkpoint continuously secures and monitors Model Context Protocol operations through static and dynamic scans, revealing hidden ris…☆111Nov 19, 2025Updated 2 months ago
- ☆41Nov 15, 2025Updated 3 months ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- AWS audits, without screenshots☆28Feb 9, 2026Updated last week
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year