google / picatrix
Picatrix is a library designed to help security analysts in a notebook environment, such as colab or jupyter.
☆47Updated 7 months ago
Alternatives and similar repositories for picatrix:
Users that are interested in picatrix are comparing it to the libraries listed below
- Specifications used in the MISP project including MISP core format☆51Updated last month
- ☆19Updated last year
- OASIS TC Open Repository: The repository cti-stix-slider supports development of a Python application to convert STIX 2.0 content to STIX…☆21Updated 10 months ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Definition, description and relationship types of MISP objects☆94Updated this week
- 1-Click push forensics evidence to the cloud☆141Updated 7 months ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆50Updated 10 months ago
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆19Updated this week
- misp-cloud - Cloud-ready images of MISP☆72Updated 2 years ago
- OASIS TC Open Repository: Match STIX content against STIX patterns☆44Updated 2 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆98Updated last month
- Converting data from services like Censys and Shodan to a common data model☆49Updated 5 months ago
- CyCAT.org API back-end server including crawlers☆30Updated 2 years ago
- OSSEM Common Data Model☆55Updated 2 years ago
- Python API wrapper for the Joe Sandbox API.☆65Updated 10 months ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆32Updated 2 weeks ago
- ☆10Updated 8 months ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆51Updated 2 months ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- A web application for generating, parsing and validating, manipulating, and visualizing CACAO v2.0 playbooks.☆25Updated 2 months ago
- Recipes for GCHQ's CyberChef Web App☆35Updated 6 years ago
- Website crawler with YARA detection☆88Updated last year
- Helm charts for running open source digital forensic tools in Kubernetes☆85Updated last week
- CARET - A tool for viewing cyber analytic relationships☆53Updated 5 years ago
- Python library for threat intelligence☆83Updated last month
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆262Updated last year
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆105Updated 6 years ago