Mhackiori/STIXnet

A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports

32
/ 100
Emerging

This project helps cybersecurity analysts quickly extract critical threat information from Cyber Threat Intelligence (CTI) reports. It takes raw text reports as input and automatically identifies all relevant STIX entities and relationships, such as malware names, attack techniques, and threat actors, outputting them in a standardized format. Cyber threat intelligence professionals and security operations teams would use this to accelerate their analysis and improve information sharing.

No commits in the last 6 months.

Use this if you need to systematically and comprehensively extract all types of STIX entities and their relationships from unstructured CTI reports to streamline your threat intelligence workflows.

Not ideal if you only need to extract a few specific types of entities, as simpler tools might suffice for narrower use cases.

cyber threat intelligence risk management security operations incident response information sharing
No License Stale 6m No Package No Dependents
Maintenance 0 / 25
Adoption 7 / 25
Maturity 8 / 25
Community 17 / 25

How are scores calculated?

Stars

29

Forks

8

Language

Python

License

Last pushed

Aug 21, 2023

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/nlp/Mhackiori/STIXnet"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.