Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)
☆36Apr 9, 2026Updated this week
Alternatives and similar repositories for stixify
Users that are interested in stixify are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Updated this week
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Mar 26, 2026Updated 2 weeks ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated last year
- Turn any blog into structured threat intelligence.☆55Updated this week
- Augmentation to Machine Readable CTI☆39Sep 9, 2025Updated 7 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 17, 2026Updated 3 weeks ago
- Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs title☆16Aug 4, 2020Updated 5 years ago
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 9 months ago
- A Python script and executable for simulating the GPS location of an iOS 17 device connected to your computer using pymobiledevice3. Prov…☆12Jan 10, 2024Updated 2 years ago
- Rapports techniques de VIGINUM☆36Sep 15, 2025Updated 6 months ago
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 6 months ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- Translate srt subtitles through Google Translation API☆16Apr 20, 2018Updated 7 years ago
- STIX2 graph visualisation library in JS☆96Feb 7, 2026Updated 2 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 4 months ago
- R interface to the Censys "cyber"/scans search engine • https://www.censys.io/tutorial☆14Aug 9, 2022Updated 3 years ago
- Technical Notes☆16Dec 1, 2017Updated 8 years ago
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆67Jul 6, 2025Updated 9 months ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆102Mar 2, 2026Updated last month
- JSON schemas for validating CACAO Security Playbooks. Note: In December 2023, Cyentific AS offered and transferred the content of this re…☆19Dec 15, 2023Updated 2 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆558May 6, 2025Updated 11 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- My Notes from Hugging Face AI Agents Course☆20Feb 18, 2025Updated last year
- 🦊 DISINFOX is a threat intelligence exchange platform for disinformation implementing the DISARM framework at its core.☆51Jul 21, 2025Updated 8 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆304Mar 19, 2026Updated 3 weeks ago
- An LLM for CTI reports - to be presented at FIRST Fukuoka 2024☆23Jan 26, 2026Updated 2 months ago
- KEV EPSS Data☆33Updated this week
- Data from Dark Web Marketplace scraping - Be careful☆43Oct 28, 2024Updated last year
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆17Updated this week
- A Flask application for analyzing activity on an online discussion forum, using scraping, indexing, analytics, relational graph and NLP.☆11Nov 24, 2020Updated 5 years ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆10Jul 1, 2023Updated 2 years ago
- We want to create a Python PLC honeypot which support multiple primary OT communication protocols such as Modbus-TCP and Siemens-S7Comm. …☆58Apr 30, 2025Updated 11 months ago
- ☆11Oct 13, 2020Updated 5 years ago
- Mapping of open-source detection rules and atomic tests.☆204Feb 16, 2026Updated last month
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 9 months ago
- ☆12Mar 23, 2016Updated 10 years ago
- Easy automated vagrant provisioning of Windows 10 with flarevm tools installed for Digital Forensics and Malware Analysis Lab.☆20May 29, 2022Updated 3 years ago