set of entities for Maltego including common STIX objects and several flavors of kill chain.
☆11May 6, 2015Updated 10 years ago
Alternatives and similar repositories for STIXtego
Users that are interested in STIXtego are comparing it to the libraries listed below
Sorting:
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 9 years ago
- OSSEC HIDS - Sucuri Fork☆11Feb 12, 2021Updated 5 years ago
- ☆46Apr 6, 2017Updated 8 years ago
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- Enrich a host with open source security information☆27Oct 4, 2015Updated 10 years ago
- A collection of bro_scripts and signatures☆27Jun 26, 2019Updated 6 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- Spider for searching Onions for other Onions☆10Oct 11, 2015Updated 10 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Docker Container for Scumblr (github.com/netflix/scumblr)☆14Jul 13, 2016Updated 9 years ago
- A tool to convert MISP XML files (events and attributes) into graphs☆20May 13, 2017Updated 8 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Mar 14, 2017Updated 8 years ago
- scripts to help beginners program in Bro☆21Aug 10, 2013Updated 12 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Python wrapper for the Spyonweb API. Not affiliated with SpyOnWeb.com or DevHQ.☆20Mar 16, 2017Updated 8 years ago
- DRAFT STIX specification documents for version 1.2☆20Oct 3, 2016Updated 9 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆18Oct 25, 2015Updated 10 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆82Nov 29, 2015Updated 10 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- 🌴 The STIX2 Pattern expression parser for humans☆26Jun 29, 2019Updated 6 years ago
- WebSocket curl - The WebSocket CLI for developers☆26May 10, 2021Updated 4 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆68Jan 21, 2018Updated 8 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Parse URLCrazy and dnstwist output and compare against previous runs to identify new typosquatted domains.☆52Oct 2, 2015Updated 10 years ago
- YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signat…☆68Jun 18, 2019Updated 6 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- ARCHIVED ce1sus, a threat information database ARCHIVED☆28Dec 8, 2015Updated 10 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago