Enables dynamic translation of structured data between formats
☆14Dec 14, 2018Updated 7 years ago
Alternatives and similar repositories for FlexTransform
Users that are interested in FlexTransform are comparing it to the libraries listed below
Sorting:
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Parse a report and import the events into MISP☆30Oct 19, 2015Updated 10 years ago
- DRAFT STIX specification documents for version 1.2☆20Oct 3, 2016Updated 9 years ago
- Ops-Trust Platform - Portal☆21Aug 5, 2016Updated 9 years ago
- The Open Command and Control Forum promotes the global development and adoption of the OpenC2 language and reference material.☆30May 25, 2017Updated 8 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- PowerShell Utilities for Security Situational Awareness☆13Jan 10, 2017Updated 9 years ago
- Website letting users query information from many different security threat intelligence APIs☆26Sep 30, 2020Updated 5 years ago
- A tool to convert MISP XML files (events and attributes) into graphs☆20May 13, 2017Updated 8 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- ☆17Sep 3, 2015Updated 10 years ago
- ☆16Mar 10, 2017Updated 8 years ago
- MineMeld nodes for MISP☆19Jan 23, 2024Updated 2 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆19Aug 19, 2016Updated 9 years ago
- \B\C\M\C\ Open Source Software☆20Jan 3, 2022Updated 4 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Graphics, icons, and diagrams to support STIX 2☆48Jun 2, 2021Updated 4 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- ☆46Apr 6, 2017Updated 8 years ago
- Python bindings to libhtp☆31Oct 13, 2020Updated 5 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- STIX2 graph widget for Jupyter notebooks, powered by stixview library☆25Jan 7, 2023Updated 3 years ago
- A python library for building and using hash databases.☆22Feb 8, 2023Updated 3 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Providing timelines based on OSINT Reports☆31Jun 21, 2023Updated 2 years ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 5 months ago
- ☆19Jul 24, 2021Updated 4 years ago
- A Tool for Measuring String Similarity☆118May 8, 2019Updated 6 years ago
- Maltego integration of https://haveibeenpwned.com☆61Mar 12, 2025Updated 11 months ago
- A Simple Network Stream Recorder☆35Mar 23, 2019Updated 6 years ago
- MISP website (hugo-based)☆25Updated this week
- Identifies phishing websites using a treebag model☆22Oct 14, 2020Updated 5 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago