threatgrid / ctimLinks
Cisco Threat Intellligence Model
☆69Updated last month
Alternatives and similar repositories for ctim
Users that are interested in ctim are comparing it to the libraries listed below
Sorting:
- Cisco Threat Intelligence API☆70Updated last week
- Documentation for Zeek☆50Updated this week
- Zeek support for Community ID flow hashing.☆36Updated 2 years ago
- pcapdj - dispatch pcap files☆46Updated 4 years ago
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated 8 months ago
- OASIS OpenC2 TC: Repository for submitting and reviewing OpenC2 use cases relevant to the work of the OpenC2 Language Subcommittee (LSC)☆28Updated 3 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Specifications used in the MISP project including MISP core format☆51Updated last week
- Best practices in threat intelligence☆47Updated 2 years ago
- An API connector for the Office 365 Management API and the Elastic Stack☆20Updated 6 years ago
- Notes for High Availability MISP in AWS☆19Updated 5 years ago
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Updated 5 years ago
- Golang Library to interact with your MISP instance☆22Updated 5 years ago
- Debian and Red Hat packaging for SIE DNS sensor☆15Updated 2 years ago
- OASIS TC Open Repository: Match STIX content against STIX patterns☆44Updated 2 years ago
- ☆33Updated 5 years ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆50Updated last year
- Bro/Zeek integration with osquery☆94Updated 4 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆53Updated 4 months ago
- Web-based sensor management suite☆20Updated 2 years ago
- Expert Investigation Guides☆52Updated 4 years ago
- OASIS TC Open Repository: Providing a collection of CTI-related training materials☆50Updated 3 years ago
- misp-cloud - Cloud-ready images of MISP☆73Updated 2 years ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆263Updated 2 years ago
- ☆36Updated 4 years ago
- Example Suricata rules implementing some of my detection tactics☆20Updated 2 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Updated 9 years ago
- SIEM USE Case Selection Methodology☆16Updated 4 years ago