freetaxii / stix2-graphicsLinks
Graphics, icons, and diagrams to support STIX 2
☆47Updated 4 years ago
Alternatives and similar repositories for stix2-graphics
Users that are interested in stix2-graphics are comparing it to the libraries listed below
Sorting:
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆151Updated 2 months ago
- Definition, description and relationship types of MISP objects☆99Updated 2 weeks ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆167Updated last year
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆34Updated 2 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- OASIS TC Open Repository: Non-normative schemas and examples for STIX 2☆125Updated 8 months ago
- OASIS TC Open Repository: TAXII 2 Server Library Written in Python☆129Updated last year
- Repository containing IOCs, CSV and MISP JSON from our blogs☆81Updated 3 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated 7 months ago
- STIX2 graph visualisation library in JS☆90Updated 3 weeks ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated last year
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆104Updated 2 months ago
- Tools to interact with APTnotes reporting/index.☆103Updated 4 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆93Updated last month
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆89Updated 3 weeks ago
- Django web interface for managing Yara rules☆193Updated 6 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated this week
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆19Updated 6 years ago
- OASIS TC Open Repository: TAXII 2 Client Library Written in Python☆116Updated last year
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆53Updated 3 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆55Updated this week
- ☆132Updated 4 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆124Updated last year
- Parse YARA rules and operate over them more easily.☆191Updated 5 months ago
- ☆49Updated last year
- Security ML models encoded as Yara rules☆214Updated 2 years ago