Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)
☆35Mar 18, 2026Updated this week
Alternatives and similar repositories for stixify
Users that are interested in stixify are comparing it to the libraries listed below
Sorting:
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Updated this week
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated 11 months ago
- Turn any blog into structured threat intelligence.☆54Updated this week
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 6 months ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 4, 2026Updated 2 weeks ago
- Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs title☆16Aug 4, 2020Updated 5 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 8 months ago
- A Python script and executable for simulating the GPS location of an iOS 17 device connected to your computer using pymobiledevice3. Prov…☆12Jan 10, 2024Updated 2 years ago
- Rapports techniques de VIGINUM☆36Sep 15, 2025Updated 6 months ago
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 6 months ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- Translate srt subtitles through Google Translation API☆16Apr 20, 2018Updated 7 years ago
- STIX2 graph visualisation library in JS☆96Feb 7, 2026Updated last month
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- Script for deploying CTF tools (Linux) tested on Kali 2☆12Feb 15, 2021Updated 5 years ago
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆67Jul 6, 2025Updated 8 months ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆102Mar 2, 2026Updated 2 weeks ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆552May 6, 2025Updated 10 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- My Notes from Hugging Face AI Agents Course☆20Feb 18, 2025Updated last year
- 🦊 DISINFOX is a threat intelligence exchange platform for disinformation implementing the DISARM framework at its core.☆51Jul 21, 2025Updated 8 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆304Updated this week
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- An LLM for CTI reports - to be presented at FIRST Fukuoka 2024☆23Jan 26, 2026Updated last month
- A list of Github users who distribute tools and tutorials on OSINT (as well as hacking, pentest, and forensics)☆13Oct 15, 2023Updated 2 years ago
- KEV EPSS Data☆31Updated this week
- Data from Dark Web Marketplace scraping - Be careful☆43Oct 28, 2024Updated last year
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆17Updated this week
- A Flask application for analyzing activity on an online discussion forum, using scraping, indexing, analytics, relational graph and NLP.☆11Nov 24, 2020Updated 5 years ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- ☆10Jul 1, 2023Updated 2 years ago
- Mapping of open-source detection rules and atomic tests.☆204Feb 16, 2026Updated last month
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 9 months ago
- Easy automated vagrant provisioning of Windows 10 with flarevm tools installed for Digital Forensics and Malware Analysis Lab.☆20May 29, 2022Updated 3 years ago
- Quick and dirty script to parse bplists with Ruby☆14Oct 29, 2020Updated 5 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- An SMB library in Go☆13Oct 27, 2022Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago