opencybersecurityalliance / ontologyView external linksLinks
The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the OpenDXL messaging bus
☆76Mar 22, 2021Updated 4 years ago
Alternatives and similar repositories for ontology
Users that are interested in ontology are comparing it to the libraries listed below
Sorting:
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Mar 29, 2021Updated 4 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- A Sinatra app for integrating Chef and Rundeck☆13Dec 1, 2022Updated 3 years ago
- Query.AI plugin for Kibana☆13Nov 10, 2019Updated 6 years ago
- ☆12Aug 8, 2022Updated 3 years ago
- Exports MISP events to STIX and ingest into McAfee ESM☆15Feb 12, 2020Updated 6 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Nov 9, 2022Updated 3 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- Pre-configured environment that supports the development and running of OpenDXL solutions☆13Mar 29, 2021Updated 4 years ago
- OASIS TC Open Repository: Non-normative schemas and examples for STIX 2☆133Jan 19, 2026Updated 3 weeks ago
- ☆19Jul 28, 2025Updated 6 months ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 3 years ago
- A tool to automatically decode and translate any TCP hexa payload data form any language to english.☆18Apr 23, 2022Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- Connector for pulling and converting STIX information from TAXII Service Providers into CB Feeds.☆15Jul 1, 2022Updated 3 years ago
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆45Oct 1, 2025Updated 4 months ago
- SysFlow documentation and issues tracker☆46Sep 30, 2024Updated last year
- Web UI for testing Elastic Beats processors☆18Updated this week
- ☆16Feb 13, 2020Updated 6 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Apr 15, 2024Updated last year
- This repository bundles various utilities and scripts I built for use with IBM QRadar SIEM☆16Jan 30, 2026Updated 2 weeks ago
- Converts Netwitness log parser configuration to Logstash configuration☆20Sep 10, 2020Updated 5 years ago
- ☆16Jun 21, 2021Updated 4 years ago
- ☆17Nov 8, 2018Updated 7 years ago
- Filebeat module for Squid access.log + Kibana dashboards. ELK 7.x☆17Sep 19, 2020Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Jul 4, 2020Updated 5 years ago
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆324Sep 27, 2024Updated last year
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆56Updated this week
- A virutal machine that brings up the environment with BeSman tool through which user can create multiple BeSman environments.☆16Nov 13, 2023Updated 2 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19May 11, 2021Updated 4 years ago
- Lua binding to the nDPI library using the LuaJIT FFI☆16Nov 5, 2020Updated 5 years ago
- This repository hosts community contributed Kestrel analytics☆18May 28, 2024Updated last year
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- OASIS TC Open Repository: TAXII 2 Server Library Written in Python☆137Apr 15, 2024Updated last year
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆24Sep 24, 2019Updated 6 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago