maltegotransforms / maltego-stix2
Generation of STIX2 compliant entities for Maltego
☆18Updated last year
Alternatives and similar repositories for maltego-stix2:
Users that are interested in maltego-stix2 are comparing it to the libraries listed below
- Graphics, icons, and diagrams to support STIX 2☆46Updated 3 years ago
- STIX 2.1 Data Modeling Tool☆26Updated 8 months ago
- Definition, description and relationship types of MISP objects☆96Updated 2 weeks ago
- Python module to use the MISP Taxonomies☆29Updated last week
- Home to the ActorTrackr source code☆28Updated 7 years ago
- Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules☆50Updated last year
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- A collection of my public YARA signatures for various malware families☆29Updated 6 months ago
- ☆33Updated 4 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆34Updated 2 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- Django web interface for managing Yara rules☆191Updated 6 years ago
- Community modules for FAME☆65Updated last month
- Cyber Threat Intelligence - Toolbox☆51Updated 6 years ago
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated 11 months ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆107Updated 7 years ago
- Feed Generator for MISP☆19Updated 2 years ago
- ☆27Updated 7 years ago
- ☆18Updated 6 years ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- Maltego local and server integration for OpenCTI☆31Updated 8 months ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆19Updated last year
- Web based Manager for Yara Rules☆57Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆60Updated last year
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 9 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 8 years ago