Firepit - STIX Columnar Storage
☆18Jun 5, 2024Updated last year
Alternatives and similar repositories for firepit
Users that are interested in firepit are comparing it to the libraries listed below
Sorting:
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆261Feb 20, 2026Updated last week
- ☆34May 4, 2020Updated 5 years ago
- This repository hosts community contributed Kestrel analytics☆18May 28, 2024Updated last year
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- A pure Go library for working with Structured Threat Information Expression (STIX™) version 2.x data☆27Apr 27, 2025Updated 10 months ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- Pritunl Access Control System☆10Feb 16, 2023Updated 3 years ago
- Debian and Red Hat packaging for SIE DNS sensor☆15May 5, 2023Updated 2 years ago
- Stanford CoreNLP NER addon for Apache Tika's NamerEntityParser☆13Feb 26, 2022Updated 4 years ago
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.☆12Feb 19, 2026Updated last week
- ☆13May 17, 2016Updated 9 years ago
- Import specific data sources into the Sigma generic and open signature format.☆79May 6, 2022Updated 3 years ago
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆324Sep 27, 2024Updated last year
- Translate STIX 2 Patterning Queries☆31Oct 4, 2018Updated 7 years ago
- ☆12Apr 26, 2018Updated 7 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- STIX2 graph visualisation library in JS☆95Feb 7, 2026Updated 3 weeks ago
- Threat Alert Logic Repository☆93Feb 7, 2019Updated 7 years ago
- OASIS TC Open Repository: Non-normative schemas and examples for STIX 2☆133Jan 19, 2026Updated last month
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated last year
- Scripts and outputs for ATLAS data in STIX JSON and ATT&CK Navigator layer formats☆23Feb 6, 2026Updated 3 weeks ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 3 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 8 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆82Jun 9, 2025Updated 8 months ago
- A Real-time Event Correlation platform☆16Jan 30, 2017Updated 9 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆17Nov 7, 2020Updated 5 years ago
- Zeek BACnet Parser - CISA ICSNPP☆22Nov 6, 2025Updated 3 months ago
- Notes for High Availability MISP in AWS☆19Nov 6, 2019Updated 6 years ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- The Repository pattern adds a separation layer between the data and domain layers of an application. It also makes the data access parts …☆28Jul 19, 2012Updated 13 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76May 22, 2024Updated last year
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Dec 9, 2019Updated 6 years ago
- A MAL language that demonstrates the Maven project structure☆23Updated this week
- An open standard for hashing network flows into identifiers, a.k.a "Community IDs".☆195Sep 23, 2024Updated last year
- Loads STIX-2 into Neo4j☆25Jul 11, 2020Updated 5 years ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Oct 13, 2025Updated 4 months ago