eclecticiq / stix-icons
stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats according to the STIX language for intelligence exchange, defined by OASIS Cyber Threat Intelligence (CTI) TC
☆34Updated 2 years ago
Alternatives and similar repositories for stix-icons:
Users that are interested in stix-icons are comparing it to the libraries listed below
- A web application for generating, parsing and validating, manipulating, and visualizing CACAO v2.0 playbooks.☆28Updated 3 months ago
- JSON schemas for validating CACAO Security Playbooks. Note: In December 2023, Cyentific AS offered and transferred the content of this re…☆18Updated last year
- Graphics, icons, and diagrams to support STIX 2☆46Updated 3 years ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated last year
- An open source platform to support analysts to organise their case and tasks☆66Updated this week
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆51Updated this week
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated 11 months ago
- Definition, description and relationship types of MISP objects☆96Updated this week
- Feed Generator for MISP☆19Updated 2 years ago
- STIX2 graph visualisation library in JS☆90Updated last month
- ☆27Updated 4 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆85Updated 3 months ago
- Augmentation to Machine Readable CTI☆30Updated last week
- A utility repo to assist with converting between MISP and STIX formats☆67Updated 4 years ago
- STIX 2.1 Data Modeling Tool☆25Updated 8 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆91Updated this week
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 2 years ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆81Updated 4 years ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆50Updated 11 months ago
- TAXII client implementation from EclecticIQ☆99Updated 3 years ago
- OASIS TC Open Repository: Match STIX content against STIX patterns☆44Updated 2 years ago
- Firepit - STIX Columnar Storage☆16Updated 9 months ago
- OASIS TC Open Repository: TAXII 2 Client Library Written in Python☆113Updated 11 months ago
- Tool to extract indicators of compromise from security reports in PDF format☆71Updated 9 months ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆53Updated 2 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- OASIS TC Open Repository: Non-normative schemas and examples for STIX 2☆121Updated 4 months ago
- Sigma Detection Rule Repository☆87Updated 4 years ago