A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...
☆19Apr 9, 2026Updated this week
Alternatives and similar repositories for ctibutler
Users that are interested in ctibutler are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆36Updated this week
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Updated this week
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 9 months ago
- ☆23Feb 9, 2018Updated 8 years ago
- My Notes from Hugging Face AI Agents Course☆20Feb 18, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆56Dec 13, 2025Updated 4 months ago
- ☆12Apr 22, 2022Updated 3 years ago
- ☆18Oct 8, 2024Updated last year
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- ☆16Mar 6, 2024Updated 2 years ago
- Введение в разработку вредоносных программ☆12Oct 15, 2023Updated 2 years ago
- Tool to automate the whole process of environment in android audits☆14Apr 30, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆93Nov 3, 2025Updated 5 months ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Jan 30, 2017Updated 9 years ago
- ☆16Updated this week
- Herramienta para Windows que permite automatizar tareas de Footprint y Fingerprint en un Test de Intrusión☆15Jan 1, 2018Updated 8 years ago
- A curated list of Awesome Threat Intelligence Blogs☆526Mar 23, 2026Updated 3 weeks ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆202Jul 3, 2024Updated last year
- ☆15Jun 9, 2018Updated 7 years ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- The simple, agnostic and lightweight logging dashboard☆26Oct 28, 2022Updated 3 years ago
- Demo simple banking API using Django and DRF☆15Jul 16, 2022Updated 3 years ago
- ☆21Dec 4, 2014Updated 11 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Mutation Based Fuzzer for IEC61850 Server IED'S☆27Jun 23, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Python SDK Client for ZincSearch☆10Sep 21, 2022Updated 3 years ago
- Share your Yara rules with VirusTotal☆27Aug 12, 2024Updated last year
- [BMVC2024] Erasing Concepts from Text-to-Image Diffusion Models with Few-shot Unlearning☆14Feb 14, 2026Updated 2 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Apr 25, 2023Updated 2 years ago
- Mix of files☆14Jul 22, 2023Updated 2 years ago
- Run remote system commands from Oracle connection - oracle exec command perl☆12Jun 6, 2015Updated 10 years ago
- ☆12Oct 29, 2015Updated 10 years ago