STIX-Modeler / UILinks
STIX 2.1 Data Modeling Tool
☆27Updated 11 months ago
Alternatives and similar repositories for UI
Users that are interested in UI are comparing it to the libraries listed below
Sorting:
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 3 years ago
- Definition, description and relationship types of MISP objects☆99Updated 3 weeks ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 9 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 3 years ago
- Feed Generator for MISP☆19Updated 2 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 3 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆52Updated 2 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆88Updated last week
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆54Updated this week
- A tool to assess data quality, built on top of the awesome OSSEM.☆78Updated 2 years ago
- A collection of my public YARA signatures for various malware families☆29Updated 9 months ago
- Specifications used in the MISP project including MISP core format☆51Updated 5 months ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Sigma Detection Rule Repository☆88Updated 5 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 8 years ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 2 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Home to the ActorTrackr source code☆29Updated 7 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated 2 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Python module to use the MISP Taxonomies☆29Updated this week
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆64Updated 2 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated last year
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Updated 4 years ago
- ☆33Updated 5 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago