opencybersecurityalliance / firepitLinks
Firepit - STIX Columnar Storage
☆16Updated last year
Alternatives and similar repositories for firepit
Users that are interested in firepit are comparing it to the libraries listed below
Sorting:
- Kestrel Jupyter Notebook Kernel☆9Updated last year
- Posture Attribute Collection and Evaluation☆23Updated last year
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated last year
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 3 years ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- Notes for High Availability MISP in AWS☆19Updated 5 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆52Updated 2 years ago
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated 7 months ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 2 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Updated 2 years ago
- ☆28Updated 4 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 5 months ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated last month
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆33Updated last year
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- Augmentation to Machine Readable CTI☆31Updated last month
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Updated 2 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆52Updated 2 months ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆16Updated last year
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆34Updated 2 years ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆17Updated last year
- Web app that provides basic navigation and annotation of ATT&CK matrices☆16Updated 4 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Updated last year
- misp-guard is a mitmproxy addon that inspects and blocks outgoing events to external MISP instances via sync mechanisms (pull/push) based…☆14Updated 3 months ago
- A Python implementation of the Community ID flow hashing standard☆23Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 5 years ago
- Open-source Fabric templates for cybersecurity and compliance☆20Updated 4 months ago