joval / jOVALLinks
An open-source JAXB data model for SCAP specification formats.
☆58Updated 3 years ago
Alternatives and similar repositories for jOVAL
Users that are interested in jOVAL are comparing it to the libraries listed below
Sorting:
- ☆280Updated 2 years ago
- OSSEC Documentation☆138Updated 11 months ago
- A repository for OSSEC rules and decoders☆54Updated 2 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆177Updated 4 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated 2 years ago
- The OVAL Language Schemas☆87Updated last year
- SCAP Scanner And Tailoring Graphical User Interface☆234Updated last year
- User interface for OpenSOC☆100Updated 10 years ago
- Alienvault ossim☆122Updated 11 months ago
- OVAL Documentation☆14Updated 8 years ago
- The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the O…☆76Updated 4 years ago
- Vulnerability Information Aggregator for CVEs☆124Updated 6 years ago
- Tools for conducting analysis of CVE data in Elasticsearch☆73Updated 5 months ago
- Vagrantfile and scripts for building a disposable OpenSOC Cluster☆29Updated 9 years ago
- Web service for scanning pcaps with snort☆110Updated 7 years ago
- ☆120Updated 11 years ago
- osquery extensions by Trail of Bits☆268Updated 2 years ago
- Understand OVAL results in a blink of an eye☆35Updated 3 years ago
- ☆100Updated 7 years ago
- A minimal Java client for the Nessus XML RPC interface☆23Updated 8 years ago
- Wazuh - RESTful API☆78Updated last year
- The OVAL Language Sandbox☆44Updated 4 years ago
- Tool for managing Zeek deployments.☆59Updated this week
- How to Zeek Sysmon Logs!☆103Updated 3 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Updated 9 years ago
- Extract files from network traffic with Zeek.☆103Updated 5 years ago
- Community driven repository of Playbooks and Apps for ThreatConnect.☆74Updated 2 months ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27Updated 6 years ago
- Wazuh - Splunk App☆56Updated last year
- Engine of MineMeld☆141Updated 2 years ago