Threat intel reports are documents. They describe adversary activity in prose: groups, techniques, infrastructure, campaigns. Getting any of it into your tools requires reading it, extracting the relevant fields, and formatting them correctly. That is analyst time spent doing data entry.
CTI Translator sends a raw report to Claude via the Anthropic API. It comes back as a structured package: threat actors, TTPs mapped to ATT&CK, IOCs, campaign context. Something your SIEM or TIP can actually consume instead of a PDF sitting in a folder.
It is a Python script. Point it at a report, get back structured intelligence. If you are still copy-pasting threat data into spreadsheets, here is the fix.
Code: github.com/roddyg01/public-projects/tree/main/cti-translator