oasis-open / cti-stix-common-objectsLinks
OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://github.com/oasis-open/cti-stix-common-objects
☆93Updated last month
Alternatives and similar repositories for cti-stix-common-objects
Users that are interested in cti-stix-common-objects are comparing it to the libraries listed below
Sorting:
- Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology☆83Updated 2 months ago
- OASIS TC Open Repository: TAXII 2 Server Library Written in Python☆129Updated last year
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆247Updated 3 weeks ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆263Updated 2 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆55Updated this week
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆167Updated last year
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆151Updated 2 months ago
- STIX2 graph visualisation library in JS☆90Updated 3 weeks ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆53Updated 3 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆315Updated 9 months ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆238Updated last year
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆89Updated 3 weeks ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆48Updated this week
- OSSEM Detection Model☆176Updated 2 years ago
- OASIS TC Open Repository: TAXII 2 Client Library Written in Python☆116Updated last year
- Seamless Threat Intelligence Platform☆48Updated last year
- Definition, description and relationship types of MISP objects☆99Updated 2 weeks ago
- Sigma rules from Joe Security☆217Updated 8 months ago
- Suricata rules for network anomaly detection☆164Updated 2 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆67Updated this week
- Threat Detection & Anomaly Detection rules for popular open-source components☆52Updated 2 years ago
- Graphics, icons, and diagrams to support STIX 2☆47Updated 4 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆188Updated 4 years ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Updated 3 weeks ago
- zeek-scripts☆44Updated 6 years ago
- Swagger/ OpenAPI specifications for security products and services☆78Updated 3 weeks ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆145Updated this week
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆88Updated 4 years ago