[ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.
☆12Feb 19, 2026Updated last week
Alternatives and similar repositories for ctx-sigmahq
Users that are interested in ctx-sigmahq are comparing it to the libraries listed below
Sorting:
- Artificial Dog to bark at deer and other garden pests using Raspberry Pi and Groundlight☆12Jun 19, 2024Updated last year
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- ☆17Feb 24, 2025Updated last year
- A streamlined way to create STIX documents!☆31Apr 30, 2014Updated 11 years ago
- Gather information on Wiki contributions from IP ranges☆23Jan 21, 2018Updated 8 years ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- Validate STIX and CybOX XML documents☆26Feb 16, 2024Updated 2 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Cleanup of older MISP events can require some work until now☆27Sep 13, 2025Updated 5 months ago
- Various Modules & Scripts for use with Viper Framework☆27Aug 20, 2019Updated 6 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 3 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆28Aug 21, 2023Updated 2 years ago
- ☆32May 14, 2018Updated 7 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Turn any blog into structured threat intelligence.☆52Feb 17, 2026Updated last week
- ☆34Nov 11, 2025Updated 3 months ago
- a collection of profiles for macOS designed for penetration testing or red teaming☆38Apr 15, 2019Updated 6 years ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- ☆14Nov 11, 2014Updated 11 years ago
- ☆41Apr 5, 2025Updated 10 months ago
- Sigma Detection Rule Repository☆92Jun 18, 2020Updated 5 years ago
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆161Jan 19, 2026Updated last month
- Data notification service: subscribe to keywords and get notified whenever an open data sources mentions that keyword.☆24Aug 25, 2013Updated 12 years ago
- ☆12May 30, 2019Updated 6 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- Zeek support for Community ID flow hashing.☆37Jul 11, 2023Updated 2 years ago
- CameraCipher Library (an IOCipher project)☆11Jul 14, 2015Updated 10 years ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- NHS Hack Day website☆13Jan 28, 2026Updated 3 weeks ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- Roadmap for Lantern development☆12Mar 2, 2018Updated 7 years ago
- OutSystems Cloud Connector☆18Feb 6, 2026Updated 3 weeks ago
- ATS Score Checker a ultimate tool for enhancing resume's compatibility with Applicant Tracking Systems (ATS). This application helps job …☆12Jul 9, 2024Updated last year
- ☆10May 8, 2018Updated 7 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- STIX2 graph visualisation library in JS☆95Feb 7, 2026Updated 3 weeks ago