eclecticiq / cabbyLinks
TAXII client implementation from EclecticIQ
☆101Updated 3 years ago
Alternatives and similar repositories for cabby
Users that are interested in cabby are comparing it to the libraries listed below
Sorting:
- An OpenTAXII Configuration for MISP☆82Updated 2 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated last year
- A utility repo to assist with converting between MISP and STIX formats☆68Updated 4 years ago
- TAXII server implementation in Python from EclecticIQ☆199Updated last year
- OASIS TC Open Repository: TAXII 2 Server Library Written in Python☆129Updated last year
- OASIS TC Open Repository: TAXII 2 Client Library Written in Python☆115Updated last year
- Docker container for MISP☆96Updated 7 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆52Updated 3 months ago
- Carbon Black Feeds☆73Updated 2 years ago
- Threat Feed Aggregation, Made Easy☆168Updated 4 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 5 years ago
- Bro scripts written by CrowdStrike Services☆146Updated 4 years ago
- Python library for the ArcSight logger REST API☆27Updated 3 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆148Updated 11 years ago
- Carbon Black API - Python language bindings☆145Updated 10 months ago
- A Splunk app to use MISP in background☆110Updated 3 weeks ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- Multithreaded threat Intelligence gathering built with Python3☆175Updated 7 years ago
- Generate STIX XML from OpenIOC XML☆92Updated 6 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆175Updated 4 years ago
- Subscribe to raw VMware Carbon Black EDR event feed and forward to another system, such as Splunk.☆73Updated last year
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Salt States for Configuring the SIFT Workstation☆104Updated this week
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆202Updated last year
- A framework for receiving and redistributing abuse feeds☆124Updated 5 years ago
- Prototypes for MineMeld nodes☆39Updated 3 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 3 years ago
- Definition, description and relationship types of MISP objects☆99Updated 3 weeks ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 3 years ago