STIX-Modeler / UILinks
STIX 2.1 Data Modeling Tool
☆27Updated last year
Alternatives and similar repositories for UI
Users that are interested in UI are comparing it to the libraries listed below
Sorting:
- Feed Generator for MISP☆19Updated 3 years ago
- Import specific data sources into the Sigma generic and open signature format.☆79Updated 3 years ago
- Definition, description and relationship types of MISP objects☆103Updated this week
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆91Updated last week
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 4 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20Updated 3 years ago
- ☆55Updated 3 years ago
- Graphics, icons, and diagrams to support STIX 2☆47Updated 4 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Updated 5 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 10 years ago
- A Splunk app to use MISP in background☆113Updated 3 weeks ago
- ☆37Updated 4 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated last week
- A tool to assess data quality, built on top of the awesome OSSEM.☆79Updated 3 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- Mapping NSM rules to MITRE ATT&CK☆72Updated 5 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆89Updated 2 years ago
- STIX2 graph visualisation library in JS☆92Updated last week
- Sigma Detection Rule Repository☆91Updated 5 years ago
- Specifications used in the MISP project including MISP core format☆52Updated this week
- Log Entry to Sigma Rule Converter☆108Updated 3 years ago
- A community event for security researchers to share their favorite notebooks☆109Updated last year
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 4 months ago
- Cyber Threat Intelligence - Toolbox☆51Updated 7 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆37Updated 3 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Updated 6 years ago
- ☆78Updated 5 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Updated 6 years ago
- Threat Alert Logic Repository☆92Updated 6 years ago