\B\C\M\C\ Open Source Software
☆20Jan 3, 2022Updated 4 years ago
Alternatives and similar repositories for oss
Users that are interested in oss are comparing it to the libraries listed below
Sorting:
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Busted. With duct tape, spit and tears. Brought to you by beer.☆12Nov 4, 2021Updated 4 years ago
- Maltego entity pack encompassing the entire STIX 1.2 data model and a targeted subset of the CybOX 2.1 data model☆11Mar 24, 2016Updated 9 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- Tools used by CSIRT and especially in the scope of CNW☆18Updated this week
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Apr 15, 2024Updated last year
- OASIS TC Open Repository: STIX Enhancement Proposals (SEPs) https://github.com/oasis-open/cti-sep-repository☆16Jun 15, 2023Updated 2 years ago
- ☆22Jun 18, 2015Updated 10 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Aug 3, 2024Updated last year
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆16Oct 27, 2021Updated 4 years ago
- ☆42Sep 16, 2022Updated 3 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- TAXII client implementation from EclecticIQ☆104Sep 3, 2021Updated 4 years ago
- Rust implementation of the DCSO Bloom filter☆29Jul 15, 2025Updated 7 months ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Dec 21, 2023Updated 2 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆69Apr 12, 2022Updated 3 years ago
- ☆30Jul 11, 2018Updated 7 years ago
- CyCAT.org API back-end server including crawlers☆29Feb 4, 2023Updated 3 years ago
- Application for STIX v2.0 objects management and analysis☆27Nov 9, 2017Updated 8 years ago
- Incident Response Scripts☆30Mar 1, 2020Updated 6 years ago
- Python samples and utilities for Chronicle APIs☆88Nov 7, 2025Updated 3 months ago
- OASIS TC Open Repository: Validate patterns used to express cyber observable content in STIX Indicators☆29Feb 11, 2026Updated 2 weeks ago
- ☆38Nov 2, 2024Updated last year
- A utility repo to assist with converting between MISP and STIX formats☆69Dec 22, 2020Updated 5 years ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆31Jul 27, 2023Updated 2 years ago
- ☆30Mar 3, 2021Updated 4 years ago
- Generate STIX XML from OpenIOC XML☆94Oct 18, 2018Updated 7 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- attempt to perma root the NEC Terrain android phone☆10Jul 24, 2015Updated 10 years ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆32Feb 2, 2022Updated 4 years ago
- My dotfiles☆12Feb 9, 2026Updated 2 weeks ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Passive Network Audit Framework☆32May 17, 2018Updated 7 years ago
- Your Browser-based EVTX Companion☆112Feb 8, 2026Updated 3 weeks ago