TAXII Server supporting the 2.1 spec.
☆20Mar 30, 2020Updated 5 years ago
Alternatives and similar repositories for TAXII-Server
Users that are interested in TAXII-Server are comparing it to the libraries listed below
Sorting:
- SpringBoot implementation of TAXII server backed with BPMN configuration☆15Feb 11, 2020Updated 6 years ago
- STIX2 graph visualisation library in JS☆95Feb 7, 2026Updated 3 weeks ago
- STIX2 graph widget for Jupyter notebooks, powered by stixview library☆25Jan 7, 2023Updated 3 years ago
- STIX 2 Fake Data Generator☆11Oct 17, 2024Updated last year
- ☆15Updated this week
- A cyber threat intelligence server based on TAXII 2 and written in Golang☆32Sep 19, 2019Updated 6 years ago
- OASIS TC Open Repository: TAXII 2 Server Library Written in Python☆137Apr 15, 2024Updated last year
- The quintessential Zeebe tasklist for BPMN Human tasks with Drag and Drop Form builder, client and server side validations, and drop in F…☆36Feb 11, 2020Updated 6 years ago
- Python interface to the CRITs API☆22Mar 10, 2017Updated 8 years ago
- OASIS TC Open Repository: Python APIs for STIX 2☆416Feb 12, 2026Updated 2 weeks ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆20Sep 4, 2018Updated 7 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- OASIS TC Open Repository: CSAF Parser tool for parsing and checking the syntax of the Common Vulnerability Reporting Framework (CVRF) con…☆24Jul 14, 2022Updated 3 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated last year
- STIX 2.1 Data Modeling Tool☆27Jul 2, 2024Updated last year
- An open source Governance Risk Compliance (GRC) solution for corporates and government☆34Jul 10, 2017Updated 8 years ago
- Java bindings for STIX☆23Sep 28, 2017Updated 8 years ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Apr 15, 2024Updated last year
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆261Feb 20, 2026Updated last week
- Open Security Controls Assessment Language (OSCAL) Deep Differencing Tool☆38Jul 19, 2023Updated 2 years ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- OASIS TC Open Repository: Non-normative schemas and examples for STIX 2☆133Jan 19, 2026Updated last month
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- Secvisogram is a web tool for creating and editing security advisories in the CSAF 2.0 format☆41Updated this week
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 8 months ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- ☆10Jan 8, 2023Updated 3 years ago
- Camunda specific stages and scenarios for the BDD testing tool JGiven.☆12Jun 11, 2025Updated 8 months ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- Show use of spock to do async testing with vertx3☆10Nov 9, 2015Updated 10 years ago
- ☆10Nov 21, 2018Updated 7 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago