casework / CASE
Cyber-investigation Analysis Standard Expression (CASE) Ontology
☆67Updated 3 weeks ago
Alternatives and similar repositories for CASE:
Users that are interested in CASE are comparing it to the libraries listed below
- This repository is for development of the Unified Cyber Ontology.☆83Updated 3 weeks ago
- This repository holds the necessary content to produce the D3FEND ontology distribution.☆61Updated last week
- Cyber Intelligence Ontology☆55Updated 7 years ago
- A web application for generating, parsing and validating, manipulating, and visualizing CACAO v2.0 playbooks.☆25Updated 3 weeks ago
- Specifications used in the MISP project including MISP core format☆51Updated last week
- Definition, description and relationship types of MISP objects☆93Updated 2 weeks ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆16Updated 3 years ago
- A fork of The Sleuthkit with Pooled Storage and APFS support. See https://www.youtube.com/watch?v=k1XPillJ7aw for more info and usage.☆26Updated 5 years ago
- Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology☆74Updated 3 weeks ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆49Updated 9 months ago
- Structured Threat Intelligence Graph☆89Updated this week
- Converting data from services like Censys and Shodan to a common data model☆48Updated 4 months ago
- Translate STIX 2 Patterning Queries☆31Updated 6 years ago
- CARET - A tool for viewing cyber analytic relationships☆53Updated 5 years ago
- The Python implementation of the AFF4 standard.☆45Updated 8 months ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated this week
- CyCAT.org taxonomies☆14Updated 3 years ago
- For storing of the volumes☆4Updated 4 years ago
- AFF4 Standard Documents☆28Updated 2 years ago
- Simple Imaging. Tactical Triage. Zero Clicks.☆18Updated 7 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆51Updated last month
- The FASTEST way to consume threat intel.☆65Updated last year
- References for FIRST CTI 2019 Symposium presentation☆23Updated 5 years ago
- A tool to extract structured cyber information from incident reports.☆79Updated 6 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆52Updated 2 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated 7 months ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆33Updated 2 years ago
- Python module to use the MISP Taxonomies☆29Updated this week