muchdogesec / obstracts
Turn any blog into structured threat intelligence.
☆28Updated this week
Alternatives and similar repositories for obstracts
Users that are interested in obstracts are comparing it to the libraries listed below
Sorting:
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 6 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 2 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆29Updated 3 weeks ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆88Updated 6 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 8 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆123Updated last year
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆25Updated last week
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆26Updated 5 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆32Updated 3 weeks ago
- ☆89Updated this week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 5 months ago
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆33Updated 9 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆76Updated this week
- ☆32Updated 3 weeks ago
- Cyber Underground General Intelligence Requirements☆92Updated last year
- Tools and scripts to deploy and manage OpenRelik instances☆13Updated 2 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆36Updated this week
- Mapping of open-source detection rules and atomic tests.☆163Updated 4 months ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆48Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆115Updated this week
- User Feedback Space of #MitreAssistant☆37Updated last year
- Baseline a Windows System against LOLBAS☆27Updated last year
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆64Updated last month
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆16Updated last week
- ☆103Updated this week
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- NOVA: The Prompt Pattern Matching☆80Updated 3 weeks ago
- C2 Active Scanner☆59Updated 11 months ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- A home for detection content developed by the delivr.to team☆69Updated 3 months ago