01Structured data modeling using STIX 2.1 Intrusion Set and Threat Actor SDOs
02Automated intelligence gathering from VirusTotal, Shodan, and AlienVault OTX
03Infrastructure correlation workflows using SpiderFoot and Maltego patterns
044,121 GitHub stars
05Dynamic TTP mapping to the MITRE ATT&CK framework via attackcti
06Automated generation of comprehensive threat actor dossiers and executive summaries