oasis-open / cti-stix-common-objectsLinks
OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://github.com/oasis-open/cti-stix-common-objects
☆97Updated 6 months ago
Alternatives and similar repositories for cti-stix-common-objects
Users that are interested in cti-stix-common-objects are comparing it to the libraries listed below
Sorting:
- Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology☆90Updated last week
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆158Updated 8 months ago
- STIX2 graph visualisation library in JS☆94Updated last month
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆242Updated last year
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆178Updated 2 years ago
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆257Updated 3 weeks ago
- Swagger/ OpenAPI specifications for security products and services☆77Updated last week
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- OASIS TC Open Repository: TAXII 2 Server Library Written in Python☆137Updated last year
- Graphics, icons, and diagrams to support STIX 2☆47Updated 4 years ago
- zeek-scripts☆45Updated 7 years ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆268Updated 2 years ago
- Structured Threat Intelligence Graph☆98Updated last week
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆120Updated last week
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated last year
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆59Updated 5 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated last week
- Mapping NSM rules to MITRE ATT&CK☆73Updated 5 years ago
- OASIS TC Open Repository: TAXII 2 Client Library Written in Python☆119Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆85Updated this week
- Definition, description and relationship types of MISP objects☆105Updated last week
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆324Updated last year
- OSSEM Common Data Model☆56Updated 3 years ago
- Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.☆293Updated 3 weeks ago
- This repository holds the necessary content to produce the D3FEND ontology distribution.☆96Updated this week
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- STIX 2.1 Data Modeling Tool☆27Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆52Updated last week
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Updated last year