jackaduma/ThreatReportExtractor

Extracting Attack Behavior from Threat Reports

43
/ 100
Emerging

This tool helps cybersecurity analysts automatically extract specific attack behaviors from Cyber Threat Intelligence (CTI) reports. You provide it with unstructured text reports, and it generates concise attack behaviors as provenance graphs, highlighting how threats unfold. Security professionals can use these graphs to improve threat hunting and incident response.

No commits in the last 6 months.

Use this if you need to quickly understand and visualize attack sequences buried in lengthy cybersecurity threat reports.

Not ideal if you're looking for a broad summary of a report or if your data isn't text-based threat intelligence.

cyber-threat-intelligence incident-response threat-hunting cybersecurity-analysis security-operations
Stale 6m No Package No Dependents
Maintenance 0 / 25
Adoption 9 / 25
Maturity 16 / 25
Community 18 / 25

How are scores calculated?

Stars

81

Forks

16

Language

Python

License

GPL-3.0

Last pushed

Apr 28, 2023

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/jackaduma/ThreatReportExtractor"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.