google / picatrixLinks
Picatrix is a library designed to help security analysts in a notebook environment, such as colab or jupyter.
☆51Updated 7 months ago
Alternatives and similar repositories for picatrix
Users that are interested in picatrix are comparing it to the libraries listed below
Sorting:
- 1-Click push forensics evidence to the cloud☆141Updated last month
- Definition, description and relationship types of MISP objects☆102Updated this week
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Updated last year
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆58Updated 3 months ago
- A framework for orchestrating forensic collection, processing and data export☆332Updated 2 weeks ago
- OSSEM Common Data Model☆56Updated 3 years ago
- Cisco Orbital - Osquery queries by Talos☆135Updated last year
- Specifications used in the MISP project including MISP core format☆52Updated this week
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- A Python library to help with some common threat hunting data analysis operations☆143Updated 2 years ago
- DFIQ is a collection of investigative questions and the approaches for answering them☆294Updated 9 months ago
- Python samples and utilities for Chronicle APIs☆85Updated 2 weeks ago
- Helm charts for running open source digital forensic tools in Kubernetes☆157Updated this week
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated last year
- ☆19Updated 7 months ago
- Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆69Updated last week
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated this week
- Swagger/ OpenAPI specifications for security products and services☆77Updated last week
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆125Updated 2 years ago
- Digital Forensics Artifacts Knowledge Base☆86Updated 2 weeks ago
- Structured Threat Intelligence Graph☆97Updated 2 weeks ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆107Updated 5 months ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year
- A community event for security researchers to share their favorite notebooks☆108Updated last year
- misp-cloud - Cloud-ready images of MISP☆74Updated 3 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆91Updated this week
- OASIS TC Open Repository: TAXII 2 Client Library Written in Python☆117Updated last year
- Best practices in threat intelligence☆48Updated 2 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆49Updated this week
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆21Updated last week