mitre / stix2patterns_translatorLinks
Translate STIX 2 Patterning Queries
☆31Updated 6 years ago
Alternatives and similar repositories for stix2patterns_translator
Users that are interested in stix2patterns_translator are comparing it to the libraries listed below
Sorting:
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆50Updated last year
- A utility repo to assist with converting between MISP and STIX formats☆69Updated 4 years ago
- An OpenTAXII Configuration for MISP☆82Updated 2 years ago
- Definition, description and relationship types of MISP objects☆99Updated this week
- Specifications used in the MISP project including MISP core format☆51Updated last month
- A Python library to help with some common threat hunting data analysis operations☆143Updated 2 years ago
- TAXII client implementation from EclecticIQ☆101Updated 3 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated last year
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- OASIS TC Open Repository: Match STIX content against STIX patterns☆44Updated 3 years ago
- InvestigationPlaybookSpec☆73Updated 7 years ago
- Carbon Black Feeds☆73Updated 2 years ago
- OASIS TC Open Repository: TAXII 2 Client Library Written in Python☆116Updated last year
- OASIS TC Open Repository: The repository cti-stix-slider supports development of a Python application to convert STIX 2.0 content to STIX…☆21Updated last year
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20Updated 3 years ago
- A tool to extract structured cyber information from incident reports.☆80Updated 6 years ago
- Hunting IOCs all day every day...☆86Updated last year
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 3 years ago
- A Splunk app to use MISP in background☆111Updated this week
- Sigma Detection Rule Repository☆89Updated 5 years ago
- Command line interface to Carbon Black Response☆38Updated 5 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆38Updated 2 years ago
- Python IOC Editor☆63Updated 10 years ago
- the fastest way to consume threat intelligence.☆29Updated 2 years ago
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 9 years ago
- ☆33Updated 5 years ago
- A website and framework for testing NIDS detection☆57Updated 3 years ago