A Python library for handling TAXII Messages invoking TAXII Services.
☆73Apr 21, 2021Updated 4 years ago
Alternatives and similar repositories for libtaxii
Users that are interested in libtaxii are comparing it to the libraries listed below
Sorting:
- A repository for development of the TAXII Specifications. For official releases, please see http://taxiiproject.github.io/releases/☆41Nov 29, 2015Updated 10 years ago
- A Python library for parsing, manipulating, and generating CybOX content.☆80May 1, 2020Updated 5 years ago
- YETI is a TAXII implementation☆47May 10, 2019Updated 6 years ago
- Installable taxii_services☆20May 10, 2019Updated 6 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 8 years ago
- A Python library for parsing, manipulating, and generating STIX content.☆247Nov 24, 2021Updated 4 years ago
- TAXII client implementation from EclecticIQ☆104Sep 3, 2021Updated 4 years ago
- OASIS TC Open Repository: TAXII 2 Client Library Written in Python☆119Apr 15, 2024Updated last year
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- TAXII server implementation in Python from EclecticIQ☆211Jan 5, 2026Updated last month
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Apr 15, 2024Updated last year
- Source for the STIX Documentation site☆49Aug 23, 2021Updated 4 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- A short and small memory forensics helper.☆52Oct 18, 2017Updated 8 years ago
- An OpenTAXII Configuration for MISP☆88Sep 29, 2022Updated 3 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28May 23, 2023Updated 2 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Jan 6, 2022Updated 4 years ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Apr 5, 2022Updated 3 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- Carbon Black Feeds☆73Apr 4, 2023Updated 2 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- playing around with food and drink sites and OSINT☆14Oct 15, 2018Updated 7 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Apr 20, 2023Updated 2 years ago
- App for storing FireHOL feeds (https://github.com/firehol/blocklist-ipsets) with a history of adding and removing each address☆35Jan 4, 2023Updated 3 years ago
- ☆207May 3, 2023Updated 2 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated this week
- DEPRECATED - USE v3 (bearded-avenger)☆229Jan 16, 2018Updated 8 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆16Aug 19, 2022Updated 3 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago