oasis-open / cti-stix-common-objectsLinks
OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://github.com/oasis-open/cti-stix-common-objects
☆97Updated 5 months ago
Alternatives and similar repositories for cti-stix-common-objects
Users that are interested in cti-stix-common-objects are comparing it to the libraries listed below
Sorting:
- Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology☆88Updated 3 months ago
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆157Updated 6 months ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆174Updated 2 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆253Updated 2 weeks ago
- OASIS TC Open Repository: TAXII 2 Server Library Written in Python☆135Updated last year
- Mapping NSM rules to MITRE ATT&CK☆72Updated 5 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated this week
- OSSEM Common Data Model☆56Updated 3 years ago
- Swagger/ OpenAPI specifications for security products and services☆77Updated last month
- STIX2 graph visualisation library in JS☆92Updated this week
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆242Updated last year
- Graphics, icons, and diagrams to support STIX 2☆47Updated 4 years ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆266Updated 2 years ago
- Sigma rules from Joe Security☆225Updated last year
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆323Updated last year
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆146Updated 4 months ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆59Updated 4 months ago
- Definition, description and relationship types of MISP objects☆103Updated 2 weeks ago
- OSSEM Detection Model☆180Updated 3 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆189Updated 4 years ago
- OASIS TC Open Repository: TAXII 2 Client Library Written in Python☆119Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Updated last year
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Updated last year
- OASIS TC Open Repository: Non-normative schemas and examples for STIX 2☆130Updated 2 weeks ago
- ☆78Updated 5 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated 11 months ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 4 months ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆91Updated last week
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago