A Python library for parsing, manipulating, and generating CybOX content.
☆80May 1, 2020Updated 5 years ago
Alternatives and similar repositories for python-cybox
Users that are interested in python-cybox are comparing it to the libraries listed below
Sorting:
- A Python library for parsing, manipulating, and generating STIX content.☆247Nov 24, 2021Updated 4 years ago
- CybOX Tools and Scripts☆44Nov 25, 2013Updated 12 years ago
- A Python library for handling TAXII Messages invoking TAXII Services.☆73Apr 21, 2021Updated 4 years ago
- A Python library for parsing, manipulating, and generating MAEC content.☆42Nov 16, 2020Updated 5 years ago
- OASIS TC Open Repository: The repository cti-stix-slider supports development of a Python application to convert STIX 2.0 content to STIX…☆22Apr 12, 2024Updated last year
- A repository for development of the TAXII Specifications. For official releases, please see http://taxiiproject.github.io/releases/☆41Nov 29, 2015Updated 10 years ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Apr 15, 2024Updated last year
- Generate TikZ graphics from tcpdump/Wireshark captures☆20Feb 2, 2013Updated 13 years ago
- Cyber Intelligence Ontology☆56Mar 17, 2017Updated 9 years ago
- Source for the STIX Documentation site☆49Aug 23, 2021Updated 4 years ago
- TAXII server implementation in Python from EclecticIQ☆211Mar 12, 2026Updated last week
- Installable taxii_services☆20May 10, 2019Updated 6 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- TAXII client implementation from EclecticIQ☆104Sep 3, 2021Updated 4 years ago
- Generate STIX XML from OpenIOC XML☆95Oct 18, 2018Updated 7 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆35Jan 8, 2026Updated 2 months ago
- ☆13May 17, 2016Updated 9 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- A command line tool that converts Sigma Rules from the SigmaHQ repository into STIX 2.1 Objects.☆12Mar 9, 2026Updated last week
- YETI is a TAXII implementation☆47May 10, 2019Updated 6 years ago
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆72Sep 23, 2025Updated 5 months ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Visualization of interaction between entities☆16Nov 28, 2016Updated 9 years ago
- Seamless Threat Intelligence Platform☆47Jan 29, 2024Updated 2 years ago
- A framework for interacting with HCL AppScan on Cloud and HCL AppScan Enterprise☆12Mar 3, 2023Updated 3 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- Extract useful information from a Twitter account.☆35Jan 1, 2014Updated 12 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- Validate STIX and CybOX XML documents☆26Feb 16, 2024Updated 2 years ago
- PE .exe packer and manual loader for Windows with compression, encryption, and much more☆56Sep 5, 2025Updated 6 months ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- TAXII Documentation☆25May 10, 2019Updated 6 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- Neuro-Symbolic Agentic Protocol☆39Dec 3, 2025Updated 3 months ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago