PerchSecurity / dendrolLinks
🌴 The STIX2 Pattern expression parser for humans
☆26Updated 6 years ago
Alternatives and similar repositories for dendrol
Users that are interested in dendrol are comparing it to the libraries listed below
Sorting:
- OASIS TC Open Repository: Validate patterns used to express cyber observable content in STIX Indicators☆29Updated last year
- OASIS TC Open Repository: Match STIX content against STIX patterns☆46Updated 3 years ago
- Command-line tool to format and syntax highlight Suricata rules☆13Updated 5 years ago
- A Python library to help with some common threat hunting data analysis operations☆143Updated 2 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 2 years ago
- Translate STIX 2 Patterning Queries☆31Updated 7 years ago
- Simple IP enrichment service and API wrapping PyASN and MaxMind GeoIP.☆73Updated 2 years ago
- STIX 2 Fake Data Generator☆11Updated last year
- Definition, description and relationship types of MISP objects☆103Updated this week
- A tool to extract structured cyber information from incident reports.☆82Updated 7 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆65Updated 2 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆34Updated this week
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆59Updated 4 months ago
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆64Updated 5 years ago
- Specifications used in the MISP project including MISP core format☆52Updated this week
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Updated last year
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆141Updated 2 years ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆82Updated 8 months ago
- InvestigationPlaybookSpec☆72Updated 8 years ago
- A Python implementation of the Community ID flow hashing standard☆23Updated last year
- TAXII client implementation from EclecticIQ☆103Updated 4 years ago
- Web based Manager for Yara Rules☆58Updated 5 years ago
- A utility repo to assist with converting between MISP and STIX formats☆69Updated 4 years ago
- A tool designed for consistent and safe capture of off network web resources.☆39Updated 8 years ago
- A framework for receiving and redistributing abuse feeds☆124Updated 6 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 10 years ago
- An OpenTAXII Configuration for MISP☆85Updated 3 years ago
- Python-based cloud node for local use☆11Updated 7 years ago