maltegotransforms / maltego-stix2Links
Generation of STIX2 compliant entities for Maltego
☆19Updated 2 years ago
Alternatives and similar repositories for maltego-stix2
Users that are interested in maltego-stix2 are comparing it to the libraries listed below
Sorting:
- Graphics, icons, and diagrams to support STIX 2☆47Updated 4 years ago
- Definition, description and relationship types of MISP objects☆105Updated last week
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 5 months ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 4 years ago
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules☆50Updated 2 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆83Updated 4 years ago
- Django web interface for managing Yara rules☆197Updated 7 years ago
- A collection of my public YARA signatures for various malware families☆30Updated last year
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- A utility repo to assist with converting between MISP and STIX formats☆69Updated 5 years ago
- A tool to extract structured cyber information from incident reports.☆82Updated 7 years ago
- Tools to interact with APTnotes reporting/index.☆108Updated 5 years ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆178Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆73Updated 5 years ago
- Cyber Threat Intelligence - Toolbox☆51Updated 7 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated 2 years ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆36Updated 3 years ago
- Create an entire YARA rule via Python? Whhhhhhaatttt?☆73Updated 6 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆114Updated 6 years ago
- Parse YARA rules and operate over them more easily.☆194Updated 10 months ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆68Updated 2 years ago
- Home to the ActorTrackr source code☆30Updated 8 years ago
- ☆34Updated 5 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 10 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆69Updated 2 months ago
- Hunting IOCs all day every day...☆87Updated 2 years ago
- Utility for parsing Bro log files into CSV or JSON format☆42Updated 2 years ago
- Cyber Threat Intelligence Feeds☆96Updated 9 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆75Updated last year