Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)
☆34Updated this week
Alternatives and similar repositories for stixify
Users that are interested in stixify are comparing it to the libraries listed below
Sorting:
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Feb 4, 2026Updated 3 weeks ago
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Feb 13, 2026Updated 2 weeks ago
- Turn any blog into structured threat intelligence.☆52Updated this week
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated 11 months ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs title☆16Aug 4, 2020Updated 5 years ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- Rust implementation of ossf osv specification☆15Jun 6, 2025Updated 8 months ago
- JSON schemas for validating CACAO Security Playbooks. Note: In December 2023, Cyentific AS offered and transferred the content of this re…☆19Dec 15, 2023Updated 2 years ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- Cyber Threat Intelligence☆78Dec 7, 2025Updated 2 months ago
- STIX2 graph visualisation library in JS☆95Feb 7, 2026Updated 3 weeks ago
- KEV EPSS Data☆31Feb 22, 2026Updated last week
- Utilities & scripts to collect and find insight from social network data and users.☆27May 28, 2025Updated 9 months ago
- 🦊 DISINFOX is a threat intelligence exchange platform for disinformation implementing the DISARM framework at its core.☆51Jul 21, 2025Updated 7 months ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆67Jul 6, 2025Updated 7 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆302Updated this week
- Rapports techniques de VIGINUM☆36Sep 15, 2025Updated 5 months ago
- Data from Dark Web Marketplace scraping - Be careful☆43Oct 28, 2024Updated last year
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- ☆11Feb 6, 2026Updated 3 weeks ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆102Feb 9, 2026Updated 2 weeks ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 9 months ago
- This program show you IMSI numbers of cellphones around you.☆12Nov 14, 2020Updated 5 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Provides a Learning Tools Interoperability (LTI) integration for creating WordPress blogs with appropriate user roles based on roles set …☆12Mar 17, 2025Updated 11 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆98Jun 4, 2025Updated 8 months ago
- Crucible is a modular framework for creating, deploying, and managing virtual environments to support training, education, and exercises.☆48Updated this week
- A Go implementation and parser for Sigma rules.☆95May 15, 2025Updated 9 months ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆189Apr 24, 2025Updated 10 months ago
- 🦜🔗 Build context-aware reasoning applications☆13Aug 17, 2024Updated last year
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago