A Java library for handling TAXII Messages and invoking TAXII Services.
☆20Mar 27, 2019Updated 6 years ago
Alternatives and similar repositories for java-taxii
Users that are interested in java-taxii are comparing it to the libraries listed below
Sorting:
- A repository for development of the TAXII Specifications. For official releases, please see http://taxiiproject.github.io/releases/☆41Nov 29, 2015Updated 10 years ago
- Installable taxii_services☆20May 10, 2019Updated 6 years ago
- Java bindings for STIX☆23Sep 28, 2017Updated 8 years ago
- Convert STIX XML to HTML☆27Nov 23, 2015Updated 10 years ago
- STIX Tools & Scripts☆47Dec 2, 2013Updated 12 years ago
- CybOX Schemas and Schema Development☆43Jun 1, 2017Updated 8 years ago
- Generate STIX XML from OpenIOC XML☆95Oct 18, 2018Updated 7 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- General Open Architecture Security Questionnaire☆31Jul 25, 2023Updated 2 years ago
- Website for the Mininet Project.☆12Apr 1, 2022Updated 3 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- Discover Olric nodes in cloud environments☆10Feb 25, 2023Updated 3 years ago
- pan-stix☆19Oct 12, 2017Updated 8 years ago
- STIX Schema Development☆75Aug 1, 2018Updated 7 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Dec 16, 2022Updated 3 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- simple c2 written in python to demonstrate security concepts☆13Sep 17, 2018Updated 7 years ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- Java utilities and useful algorithms☆15Apr 14, 2023Updated 2 years ago
- Kafka based openbmp client/consumer that manages BGP RIB tables☆11Oct 1, 2017Updated 8 years ago
- playing around with food and drink sites and OSINT☆14Oct 15, 2018Updated 7 years ago
- OCSF Schema Validation☆12Dec 13, 2024Updated last year
- STIX 2.x Java Library☆30Nov 16, 2022Updated 3 years ago
- Windows Event log to *nix syslog sender☆25May 2, 2013Updated 12 years ago
- A Multi-classification of chinese text with cnn-rnn model.☆11Jun 1, 2018Updated 7 years ago
- ☆22Jul 1, 2019Updated 6 years ago
- HAR file reader, writer and viewer☆16May 20, 2022Updated 3 years ago
- HIBP Audit - Audit Active Directory user accounts against HIBP☆15Sep 23, 2021Updated 4 years ago
- ☆13Jul 29, 2025Updated 7 months ago
- Smart Life API☆13Dec 6, 2017Updated 8 years ago
- Send GitLab events into a Brigade pipeline☆16Nov 18, 2019Updated 6 years ago
- A content inspecting SMTP proxy☆17Jun 9, 2014Updated 11 years ago
- Drools Developer's Cookbook examples☆28Feb 13, 2012Updated 14 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Jun 9, 2019Updated 6 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- Kafka, Spark Streaming, Kudu integration examples☆17Dec 22, 2017Updated 8 years ago
- Set of Hadoop, Spark and Storm based tools for web and customer analytic☆34Jun 7, 2021Updated 4 years ago
- Analyze Zeek IDS data with ksqlDB running on Confluent Platform via Docker on your laptop. Or spin up an arbitrary number of AWS hosts, …☆11Sep 30, 2021Updated 4 years ago