CybOXProject / schemasLinks
CybOX Schemas and Schema Development
☆43Updated 8 years ago
Alternatives and similar repositories for schemas
Users that are interested in schemas are comparing it to the libraries listed below
Sorting:
- Collection of data sources that can be used to provide context to security events☆25Updated 10 years ago
- ☆28Updated 8 years ago
- YETI is a TAXII implementation☆46Updated 6 years ago
- Generate STIX XML from OpenIOC XML☆92Updated 6 years ago
- CRITs Services Collection☆184Updated 4 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 9 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- STIX Schema Development☆76Updated 6 years ago
- Threat Intelligence distribution☆30Updated 9 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago
- A Python library for parsing, manipulating, and generating CybOX content.☆78Updated 5 years ago
- This is a script module for Bro that encapsulates and detects activity related to the Mandiant APT1 report.☆48Updated 11 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- CRITs IOC Visualization in Maltego☆28Updated 10 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆37Updated 9 years ago
- STIX Tools & Scripts☆47Updated 11 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆81Updated 9 years ago
- A framework for receiving and redistributing abuse feeds☆124Updated 5 years ago
- ☆85Updated 11 years ago
- integrating bro into yara☆33Updated 10 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Updated 9 years ago
- Bro/Zeek integration with osquery☆94Updated 4 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- Hunting IOCs all day every day...☆86Updated last year
- An OpenTAXII Configuration for MISP☆82Updated 2 years ago
- A tool to extract structured cyber information from incident reports.☆80Updated 6 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆34Updated 9 years ago
- Docker container for MISP☆96Updated 7 years ago
- Cyber Intel Management☆48Updated 7 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 3 years ago