STIX-Modeler / UI
STIX 2.1 Data Modeling Tool
☆27Updated 10 months ago
Alternatives and similar repositories for UI:
Users that are interested in UI are comparing it to the libraries listed below
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- Definition, description and relationship types of MISP objects☆97Updated 3 weeks ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆88Updated last month
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 2 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated 10 months ago
- ☆35Updated 4 years ago
- Home to the ActorTrackr source code☆29Updated 7 years ago
- Feed Generator for MISP☆19Updated 2 years ago
- Translate STIX 2 Patterning Queries☆31Updated 6 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 4 months ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆53Updated last week
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- ☆78Updated 4 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆100Updated 3 months ago
- Sigma Detection Rule Repository☆87Updated 4 years ago
- Graphics, icons, and diagrams to support STIX 2☆46Updated 3 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Python module to use the MISP Taxonomies☆29Updated last month
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- A collection of my public YARA signatures for various malware families☆29Updated 7 months ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆40Updated 6 years ago