cyware-labs / cytaxii2
☆16Updated last year
Alternatives and similar repositories for cytaxii2:
Users that are interested in cytaxii2 are comparing it to the libraries listed below
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆53Updated this week
- A collection of tips for using MISP.☆74Updated 4 months ago
- ☆87Updated 2 months ago
- ☆74Updated 3 weeks ago
- Open-source Fabric templates for cybersecurity and compliance☆17Updated 3 months ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- The FASTEST way to consume threat intel.☆68Updated last year
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Converting data from services like Censys and Shodan to a common data model☆49Updated 7 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆18Updated 2 months ago
- Sample programs to access the API☆81Updated last month
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆55Updated 3 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆72Updated 5 months ago
- pySigma Splunk backend☆38Updated 2 months ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆53Updated 2 years ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 5 months ago
- Wrap any binary into a cached webserver☆53Updated 3 years ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆14Updated last week
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- ☆27Updated 4 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- Automatic detection engineering technical state compliance☆55Updated 9 months ago
- MITRE ATT&CK Based App in Power BI☆13Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆111Updated 5 months ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆31Updated last year
- An open source platform to support analysts to organise their case and tasks☆71Updated this week
- ☆19Updated 3 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆53Updated this week
- ☆34Updated 4 years ago