Loads STIX-2 into Neo4j
☆26Jul 11, 2020Updated 5 years ago
Alternatives and similar repositories for StixToNeoDB
Users that are interested in StixToNeoDB are comparing it to the libraries listed below
Sorting:
- SpringBoot implementation of TAXII server backed with BPMN configuration☆15Feb 11, 2020Updated 6 years ago
- STIX 2.x Java Library☆30Nov 16, 2022Updated 3 years ago
- TAXII Server supporting the 2.1 spec.☆20Mar 30, 2020Updated 5 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- OASIS TC Open Repository: Providing a collection of CTI-related training materials☆50Feb 10, 2022Updated 4 years ago
- OASIS TC Open Repository: The repository cti-stix-slider supports development of a Python application to convert STIX 2.0 content to STIX…☆22Apr 12, 2024Updated last year
- A pure Go library for working with Structured Threat Information Expression (STIX™) version 2.x data☆27Apr 27, 2025Updated 10 months ago
- A desktop App to add STIX-2 objects to TAXII-2.0 servers☆11Mar 13, 2019Updated 7 years ago
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- ☆14Jun 28, 2023Updated 2 years ago
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆22Jul 11, 2022Updated 3 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆98Jun 4, 2025Updated 9 months ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- A simple graph explorer leveraging yFiles for HTML, neo4j bolt, implemented using VueJS and Vuetify☆12Apr 4, 2023Updated 2 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- An SMB library in Go☆13Oct 27, 2022Updated 3 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- ☆16Aug 28, 2020Updated 5 years ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆21Sep 22, 2025Updated 5 months ago
- This project deals with vulnerability analysis and classification using machine learning techniques i.e. Natural Language Processing.☆10Feb 21, 2019Updated 7 years ago
- Automate claim approval in personal insurance sector.☆20Apr 21, 2016Updated 9 years ago
- A library exposing TLS/DTLS sockets using the POSIX networking APIs☆18Sep 9, 2019Updated 6 years ago
- ☆13Feb 17, 2023Updated 3 years ago
- Understand OVAL results in a blink of an eye☆35Jul 6, 2022Updated 3 years ago
- Personal Scoop bucket☆12Updated this week
- ☆37May 21, 2014Updated 11 years ago
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆261Updated this week
- A MAL language that demonstrates the Maven project structure☆23Feb 27, 2026Updated 3 weeks ago
- STIX Schema Development☆75Aug 1, 2018Updated 7 years ago
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27May 22, 2019Updated 6 years ago
- Application for STIX v2.0 objects management and analysis☆27Nov 9, 2017Updated 8 years ago
- MISP - Ansible installation script☆23Feb 16, 2019Updated 7 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- OpenRefine reconciler for Research Organization Registry☆13Feb 13, 2026Updated last month
- A light weight wrapper to the JDK HttpClient☆25Jan 16, 2023Updated 3 years ago
- A script that turns a phrase into a one-time pad and series of numbers. It also creates an audio file reading the series of numbers, to r…☆12Nov 15, 2021Updated 4 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago