YETI is a TAXII implementation
☆47May 10, 2019Updated 6 years ago
Alternatives and similar repositories for yeti
Users that are interested in yeti are comparing it to the libraries listed below
Sorting:
- A Java library for handling TAXII Messages and invoking TAXII Services.☆20Mar 27, 2019Updated 6 years ago
- A repository for development of the TAXII Specifications. For official releases, please see http://taxiiproject.github.io/releases/☆41Nov 29, 2015Updated 10 years ago
- Installable taxii_services☆20May 10, 2019Updated 6 years ago
- STIX Tools & Scripts☆47Dec 2, 2013Updated 12 years ago
- A Python library for handling TAXII Messages invoking TAXII Services.☆73Apr 21, 2021Updated 4 years ago
- OASIS TC Open Repository: TAXII 2 Client Library Written in Python☆120Apr 15, 2024Updated last year
- playing around with food and drink sites and OSINT☆14Oct 15, 2018Updated 7 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Aug 13, 2021Updated 4 years ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- STIX Schema Development☆75Aug 1, 2018Updated 7 years ago
- STIX Visualization Tool☆110Jul 13, 2018Updated 7 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33May 14, 2016Updated 9 years ago
- Integrate Zeek with Alienvault OTX☆25Sep 11, 2020Updated 5 years ago
- This is a webshell open source project☆10Oct 7, 2016Updated 9 years ago
- Threat Intelligence Quotient Test - Dataviz and Statistical Analysis of TI feeds☆177Oct 19, 2015Updated 10 years ago
- ARCHIVED ce1sus, a threat information database ARCHIVED☆28Dec 8, 2015Updated 10 years ago
- A Python library for parsing, manipulating, and generating CybOX content.☆80May 1, 2020Updated 5 years ago
- Your bag of handy codes for malware researchers☆120Mar 20, 2020Updated 6 years ago
- ☆12Nov 9, 2017Updated 8 years ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- The Open Command and Control Forum promotes the global development and adoption of the OpenC2 language and reference material.☆30May 25, 2017Updated 8 years ago
- Extract the top level domain and subdomain from a host name.☆17Jan 6, 2020Updated 6 years ago
- KeyTerms centralized terminology management tool☆13Feb 7, 2019Updated 7 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆16Oct 10, 2016Updated 9 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Mar 24, 2017Updated 8 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆194Jun 25, 2015Updated 10 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- ☆134Jun 11, 2021Updated 4 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- ☆15Sep 19, 2021Updated 4 years ago
- Malware/IOC ingestion and processing engine☆110Nov 20, 2018Updated 7 years ago
- pan-stix☆19Oct 12, 2017Updated 8 years ago
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Jan 2, 2018Updated 8 years ago
- simple c2 written in python to demonstrate security concepts☆13Sep 17, 2018Updated 7 years ago
- A Python library for parsing, manipulating, and generating STIX content.☆247Nov 24, 2021Updated 4 years ago