PerchSecurity / dendrolLinks
🌴 The STIX2 Pattern expression parser for humans
☆26Updated 6 years ago
Alternatives and similar repositories for dendrol
Users that are interested in dendrol are comparing it to the libraries listed below
Sorting:
- OASIS TC Open Repository: Validate patterns used to express cyber observable content in STIX Indicators☆28Updated last year
- OASIS TC Open Repository: Match STIX content against STIX patterns☆44Updated 2 years ago
- Python-based cloud node for local use☆11Updated 7 years ago
- Command-line tool to format and syntax highlight Suricata rules☆13Updated 5 years ago
- Python module to use the MISP Taxonomies☆29Updated 3 weeks ago
- STIX 2 Fake Data Generator☆11Updated 9 months ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆33Updated 3 weeks ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- Analysis Correlation Engine☆26Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Community modules for FAME☆65Updated 5 months ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- Python script to automatically create sigma rules from The hive observables☆25Updated 6 years ago
- ☆18Updated 7 years ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆81Updated 4 months ago
- ☆83Updated 2 years ago
- ☆15Updated 7 years ago
- Python bindings for Yeti's API☆18Updated last year
- Simple IP enrichment service and API wrapping PyASN and MaxMind GeoIP.☆73Updated 2 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆19Updated last year
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- InvestigationPlaybookSpec☆73Updated 7 years ago
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- A Python library to help with some common threat hunting data analysis operations☆143Updated 2 years ago
- ☆23Updated 4 years ago
- Create an entire YARA rule via Python? Whhhhhhaatttt?☆74Updated 6 years ago
- Definition, description and relationship types of MISP objects☆99Updated 2 weeks ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆50Updated last year
- Universal Honey Pot☆29Updated 2 years ago