STIXProject / stix-to-html
Convert STIX XML to HTML
☆27Updated 9 years ago
Alternatives and similar repositories for stix-to-html:
Users that are interested in stix-to-html are comparing it to the libraries listed below
- Generate STIX XML from OpenIOC XML☆92Updated 6 years ago
- STIX Visualization Tool☆108Updated 6 years ago
- Automated IOC-Generation scripts and tools☆24Updated 8 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago
- ☆75Updated 3 years ago
- Various Bro scripts☆96Updated 8 years ago
- YETI is a TAXII implementation☆46Updated 5 years ago
- ☆151Updated 6 years ago
- Bro scripts to be shared with the community☆109Updated 12 years ago
- Bro-IDS scripts☆50Updated 8 years ago
- Modified edition of cuckoo community modules☆50Updated 7 years ago
- ☆71Updated 3 years ago
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- Bro/Zeek integration with osquery☆94Updated 4 years ago
- A dumb set of scripts for building a cuckoo rig☆61Updated 8 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆80Updated 9 years ago
- Bro scripts written by CrowdStrike Services☆146Updated 3 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Parse a report and import the events into MISP☆29Updated 9 years ago
- Various Modules & Scripts for use with Viper Framework☆27Updated 5 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- Beholder is a shell script which installs and configures essentials to peer into your network activity.☆19Updated 7 years ago
- ☆202Updated last year
- stoQ Public Plugins☆71Updated 2 years ago
- This is a script module for Bro that encapsulates and detects activity related to the Mandiant APT1 report.☆47Updated 11 years ago
- ☆36Updated 8 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆34Updated 9 years ago
- Some IR notes☆73Updated 8 years ago
- ☆37Updated 10 years ago