jackaduma/ThreatReportExtractor
Extracting Attack Behavior from Threat Reports
This tool helps cybersecurity analysts automatically extract specific attack behaviors from Cyber Threat Intelligence (CTI) reports. You provide it with unstructured text reports, and it generates concise attack behaviors as provenance graphs, highlighting how threats unfold. Security professionals can use these graphs to improve threat hunting and incident response.
No commits in the last 6 months.
Use this if you need to quickly understand and visualize attack sequences buried in lengthy cybersecurity threat reports.
Not ideal if you're looking for a broad summary of a report or if your data isn't text-based threat intelligence.
Stars
81
Forks
16
Language
Python
License
GPL-3.0
Category
Last pushed
Apr 28, 2023
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/jackaduma/ThreatReportExtractor"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
stratosphereips/StratosphereLinuxIPS
Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine...
PowerLZY/Bold-Falcon
毕方智能云沙箱(Bold-Falcon)是一个开源的自动化恶意软件分析系统;
BBVA/waf-brain
Machine Learning WAF Based
hmishra2250/Botnet-Detection-using-Machine-Learning
Repository of Bachelor's Major Project on Botnet Detection
fabriziosalmi/nginx-waf-ai
Automatically detect threats and deploy WAF rules using machine learning