workingDog / cyberstationFX
A desktop App to add STIX-2 objects to TAXII-2.0 servers
☆11Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for cyberstationFX
- An OpenTAXII Configuration for MISP☆81Updated 2 years ago
- A utility repo to assist with converting between MISP and STIX formats☆64Updated 3 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated 4 months ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Splunk Boss of the SOC v1 data set.☆111Updated 6 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆54Updated 3 years ago
- A Splunk app to use MISP in background☆109Updated 2 weeks ago
- Python library for the ArcSight logger REST API☆27Updated 3 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Docker container for MISP☆96Updated 6 years ago
- Carbon Black Feeds☆70Updated last year
- A framework for receiving and redistributing abuse feeds☆118Updated 5 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆106Updated 4 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 5 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 8 years ago
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆90Updated 7 years ago
- Translate STIX 2 Patterning Queries☆30Updated 6 years ago
- Generate STIX XML from OpenIOC XML☆89Updated 6 years ago
- Hunting IOCs all day every day...☆82Updated last year
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆36Updated last year
- TAXII client implementation from EclecticIQ☆98Updated 3 years ago
- Threat Alert Logic Repository☆88Updated 5 years ago
- Coming to a place near you.....☆25Updated 9 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 11 months ago
- ☆48Updated 8 years ago