STIXProject / stix-validatorLinks
Validate STIX and CybOX XML documents
☆27Updated last year
Alternatives and similar repositories for stix-validator
Users that are interested in stix-validator are comparing it to the libraries listed below
Sorting:
- Community modules for FAME☆65Updated 2 months ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated last year
- DEPRECATED USE v3!☆59Updated 10 years ago
- Passive DNS Common Output Format☆37Updated last year
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- Yara syntax highlighting☆25Updated 4 years ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- A streamlined way to create STIX documents!☆32Updated 11 years ago
- Specifications used in the MISP project including MISP core format☆52Updated last week
- Cli interface to threatcrowd.org☆19Updated 8 years ago
- ☆85Updated 12 years ago
- ☆18Updated 10 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 2 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Updated 6 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Updated 7 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 3 weeks ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Updated 4 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 10 years ago
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆34Updated 4 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Updated 9 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Updated 11 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆87Updated 6 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 9 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 9 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- Bit9 Platform☆20Updated 8 years ago