Mhackiori/STIXnet
A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports
This project helps cybersecurity analysts quickly extract critical threat information from Cyber Threat Intelligence (CTI) reports. It takes raw text reports as input and automatically identifies all relevant STIX entities and relationships, such as malware names, attack techniques, and threat actors, outputting them in a standardized format. Cyber threat intelligence professionals and security operations teams would use this to accelerate their analysis and improve information sharing.
No commits in the last 6 months.
Use this if you need to systematically and comprehensively extract all types of STIX entities and their relationships from unstructured CTI reports to streamline your threat intelligence workflows.
Not ideal if you only need to extract a few specific types of entities, as simpler tools might suffice for narrower use cases.
Stars
29
Forks
8
Language
Python
License
—
Category
Last pushed
Aug 21, 2023
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/nlp/Mhackiori/STIXnet"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
bcgov/tno
Today's News Online (TNO) is a news aggregation system that takes in news sources of varying...
NoahFinberg/insight_extractor
A package of a simple version of the Considdr (2014-2020) ML model used to extract insights from...
marinaramalhete/nlp-toolkit
Multi-feature NLP toolkit built with Streamlit — text summarization, named entity recognition,...
baboonzero/invisible-threads
Discovers "invisible threads" - non-obvious insights that connect across 300+ podcast...
prakharrathi25/Text-Analytics-Tool
This is an application that automates the process of text analysis with a user-friendly GUI. 📱...