cyware-labs / cytaxii2Links
☆16Updated 2 months ago
Alternatives and similar repositories for cytaxii2
Users that are interested in cytaxii2 are comparing it to the libraries listed below
Sorting:
- ☆88Updated this week
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆55Updated last week
- The FASTEST way to consume threat intel.☆68Updated 2 years ago
- An open source platform to support analysts to organise their case and tasks☆96Updated this week
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆112Updated 8 months ago
- ☆28Updated 4 years ago
- Swagger/ OpenAPI specifications for security products and services☆78Updated last month
- ☆119Updated last year
- Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS☆159Updated 9 months ago
- Fast IOC and YARA Scanner☆81Updated 5 years ago
- A collection of tips for using MISP.☆74Updated 8 months ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆54Updated 3 weeks ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆88Updated 4 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Sample programs to access the API☆89Updated 3 months ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆90Updated last month
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated last year
- Dictionary of CTI-related acronyms, terms, and jargon☆143Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 2 weeks ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆71Updated 2 years ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 9 months ago
- Resources, tools and utilities about Threat Intelligence☆70Updated 2 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆164Updated last year
- ☆94Updated 2 months ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆143Updated last month
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆97Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆57Updated 3 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆47Updated 2 months ago
- ☆52Updated 3 years ago