Structured Threat Intelligence Graph
☆99Dec 30, 2025Updated 2 months ago
Alternatives and similar repositories for STIG
Users that are interested in STIG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit, Malware and Vulnerability Scoring Application☆15Oct 5, 2023Updated 2 years ago
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Jan 21, 2021Updated 5 years ago
- Zeek BACnet Parser - CISA ICSNPP☆23Nov 6, 2025Updated 4 months ago
- WiiBin is a framework to determine architecture of an unknown binary and locate opcode sections within the same binary via supervised mac…☆20Dec 16, 2025Updated 3 months ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- OASIS CTI TC: Provides issue tracking and wiki pages for the STIX 2.x Work Products☆26Sep 12, 2025Updated 6 months ago
- Convert your spreadsheet or CSV for the GIAC exam to a more compact index. Inspired by Voltaire and usable offline.☆20Jun 6, 2025Updated 9 months ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 3 years ago
- ☆16Dec 4, 2023Updated 2 years ago
- ☆12Sep 8, 2025Updated 6 months ago
- Query.AI plugin for Kibana☆13Nov 10, 2019Updated 6 years ago
- Simple packet dissector that detects anomalous DNP3 traffic by analysing its parameters☆15Jan 12, 2016Updated 10 years ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆459Feb 19, 2026Updated last month
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆91Mar 11, 2026Updated 2 weeks ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A pure Go library for working with Structured Threat Information Expression (STIX™) version 2.x data☆27Apr 27, 2025Updated 11 months ago
- Multithreaded threat Intelligence gathering built with Python3☆177Jan 23, 2018Updated 8 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- Zeek-Formatted Threat Intelligence Feeds☆392Updated this week
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆35Jun 5, 2024Updated last year
- Miscellaneous scripts for analyzing protocols and systems☆14Jun 24, 2016Updated 9 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Apr 15, 2024Updated last year
- OWASP Foundation web repository☆22Jan 7, 2026Updated 2 months ago
- Python interpreter for SEL (Schweitzer Engineering Laboratories) CEV (Compressed EVent record) files.☆14Jan 16, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆41May 30, 2024Updated last year
- Zeek Ethernet/IP and CIP Parser - CISA ICSNPP☆26Mar 3, 2026Updated 3 weeks ago
- A tool for detecting sensitive data in code repositories☆18Feb 25, 2026Updated last month
- Open-source CMDB for ICS and OT environments — map assets, visualize networks, track changes, and keep control.☆51Mar 18, 2026Updated last week
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 9 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆82Oct 25, 2017Updated 8 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆92Mar 20, 2026Updated last week
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Beer-ISAC Community Resources☆26Jan 22, 2021Updated 5 years ago
- This repo contains example of raw event examples and possible translations to the OCSF schema.☆59Jul 31, 2025Updated 7 months ago
- Zeek network security monitor plugin that enables parsing of the Profinet protocol☆31May 30, 2024Updated last year
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- Dockerized Zeek☆12Mar 9, 2024Updated 2 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago