casework / CASE
Cyber-investigation Analysis Standard Expression (CASE) Ontology
☆67Updated this week
Alternatives and similar repositories for CASE:
Users that are interested in CASE are comparing it to the libraries listed below
- This repository holds the necessary content to produce the D3FEND ontology distribution.☆65Updated this week
- This repository is for development of the Unified Cyber Ontology.☆89Updated last week
- Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology☆76Updated 3 weeks ago
- Specifications used in the MISP project including MISP core format☆51Updated 2 months ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆16Updated 3 years ago
- Cyber Intelligence Ontology☆55Updated 8 years ago
- Structured Threat Intelligence Graph☆90Updated last week
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆51Updated last week
- A web application for generating, parsing and validating, manipulating, and visualizing CACAO v2.0 playbooks.☆28Updated 3 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated 11 months ago
- Definition, description and relationship types of MISP objects☆96Updated last week
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆53Updated 2 years ago
- OASIS TC Open Repository: Match STIX content against STIX patterns☆44Updated 2 years ago
- ☆27Updated 4 years ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆50Updated 11 months ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 6 months ago
- Best practices in threat intelligence☆46Updated 2 years ago
- STIX 2.1 Data Modeling Tool☆26Updated 8 months ago
- Unified Cybersecurity Ontology☆96Updated 5 years ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆19Updated 6 years ago
- Translate STIX 2 Patterning Queries☆31Updated 6 years ago
- Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.☆270Updated 3 weeks ago
- CARET - A tool for viewing cyber analytic relationships☆54Updated 5 years ago
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆30Updated 3 years ago
- OASIS TC Open Repository: The repository cti-stix-slider supports development of a Python application to convert STIX 2.0 content to STIX…☆21Updated 11 months ago
- The Python implementation of the AFF4 standard.☆45Updated 11 months ago
- Graphics, icons, and diagrams to support STIX 2☆46Updated 3 years ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆34Updated 2 years ago
- Open Source Threat Intelligence Platform☆152Updated last year
- A tool to extract structured cyber information from incident reports.☆80Updated 6 years ago