oasis-open / cti-stix-common-objectsLinks
OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://github.com/oasis-open/cti-stix-common-objects
☆94Updated 2 months ago
Alternatives and similar repositories for cti-stix-common-objects
Users that are interested in cti-stix-common-objects are comparing it to the libraries listed below
Sorting:
- Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology☆86Updated 3 weeks ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆240Updated last year
- OASIS TC Open Repository: TAXII 2 Server Library Written in Python☆132Updated last year
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆153Updated 4 months ago
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆247Updated this week
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆263Updated 2 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆189Updated 4 years ago
- Graphics, icons, and diagrams to support STIX 2☆47Updated 4 years ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆168Updated last year
- OSSEM Common Data Model☆56Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 5 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆55Updated this week
- STIX2 graph visualisation library in JS☆90Updated 2 months ago
- Swagger/ OpenAPI specifications for security products and services☆78Updated 3 weeks ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆90Updated this week
- OASIS TC Open Repository: TAXII 2 Client Library Written in Python☆116Updated last year
- Sigma rules from Joe Security☆218Updated 9 months ago
- ☆77Updated 5 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆55Updated last month
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆143Updated last month
- Suricata rules for network anomaly detection☆167Updated 4 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆377Updated this week
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆37Updated 3 months ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆157Updated 5 months ago
- Open source endpoint agent providing host information to Zeek. [v2]☆85Updated last week
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Updated 2 months ago
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆116Updated this week
- OASIS TC Open Repository: Non-normative schemas and examples for STIX 2☆127Updated last month