Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)
☆38May 14, 2026Updated last week
Alternatives and similar repositories for stixify
Users that are interested in stixify are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆81Updated this week
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆20May 14, 2026Updated last week
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated last year
- Turn any blog into structured threat intelligence.☆58May 14, 2026Updated last week
- Augmentation to Machine Readable CTI☆38Apr 22, 2026Updated 3 weeks ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Apr 21, 2026Updated 3 weeks ago
- Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs title☆17Aug 4, 2020Updated 5 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- A Python script and executable for simulating the GPS location of an iOS 17 device connected to your computer using pymobiledevice3. Prov…☆12Jan 10, 2024Updated 2 years ago
- Rapports techniques de VIGINUM☆37Sep 15, 2025Updated 8 months ago
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 8 months ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- Translate srt subtitles through Google Translation API☆16Apr 20, 2018Updated 8 years ago
- STIX2 graph visualisation library in JS☆99Feb 7, 2026Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Port listener / honeypot in Rust with protocol guessing and safe string display☆36Apr 24, 2026Updated 3 weeks ago
- Utilities & scripts to collect and find insight from social network data and users.☆27May 28, 2025Updated 11 months ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆24Dec 11, 2023Updated 2 years ago
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 5 months ago
- Script for deploying CTF tools (Linux) tested on Kali 2☆13Feb 15, 2021Updated 5 years ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆104May 8, 2026Updated last week
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆71Jul 6, 2025Updated 10 months ago
- Rust implementation of ossf osv specification☆15Apr 2, 2026Updated last month
- JSON schemas for validating CACAO Security Playbooks. Note: In December 2023, Cyentific AS offered and transferred the content of this re…☆19Dec 15, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆564May 6, 2025Updated last year
- Search library for yandex.ru search engine.☆16Jun 13, 2017Updated 8 years ago
- My Notes from Hugging Face AI Agents Course☆19Feb 18, 2025Updated last year
- An LLM for CTI reports - to be presented at FIRST Fukuoka 2024☆23May 13, 2026Updated last week
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- A list of Github users who distribute tools and tutorials on OSINT (as well as hacking, pentest, and forensics)☆16Oct 15, 2023Updated 2 years ago
- Data from Dark Web Marketplace scraping - Be careful☆44Oct 28, 2024Updated last year
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆18May 13, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- ☆10Jul 1, 2023Updated 2 years ago
- We want to create a Python PLC honeypot which support multiple primary OT communication protocols such as Modbus-TCP and Siemens-S7Comm. …☆58Apr 30, 2025Updated last year
- ☆11Oct 13, 2020Updated 5 years ago
- Mapping of open-source detection rules and atomic tests.☆211Feb 16, 2026Updated 3 months ago
- Yara scan Phishing Kit's Zip archive(s)☆62Jun 20, 2025Updated 11 months ago
- Quick and dirty script to parse bplists with Ruby☆14Oct 29, 2020Updated 5 years ago