yukh1402 / cti-stix-diamond-activity-attack-graphView external linksLinks
STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling
☆33Dec 9, 2024Updated last year
Alternatives and similar repositories for cti-stix-diamond-activity-attack-graph
Users that are interested in cti-stix-diamond-activity-attack-graph are comparing it to the libraries listed below
Sorting:
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Apr 15, 2024Updated last year
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆51Nov 14, 2019Updated 6 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Apr 19, 2025Updated 9 months ago
- ☆15Aug 31, 2023Updated 2 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- ☆20Apr 10, 2025Updated 10 months ago
- Rapports techniques de VIGINUM☆36Sep 15, 2025Updated 5 months ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated last year
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 3 years ago
- provides a Suricata Eve output for Kafka with Suricate Eve plugin☆15Nov 25, 2021Updated 4 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 5 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆128Jan 9, 2023Updated 3 years ago
- This repository contains generated contextual data utilized by pyattck.☆19Mar 3, 2025Updated 11 months ago
- Parses the FireEye HX .mans triage collections and sends them to ElasticSearch☆16Feb 17, 2023Updated 3 years ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- Script to create MITRE ATT&CK Navigator layers from the annotated detection rules in Elastic Security (Kibana).☆20Jul 1, 2023Updated 2 years ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 8 months ago
- User Feedback Space of #MitreAssistant☆38May 19, 2023Updated 2 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆16Oct 27, 2021Updated 4 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- ☆15Aug 29, 2025Updated 5 months ago
- List of sigma for a variety of threats for multiple log sources.☆13Nov 23, 2018Updated 7 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Nov 15, 2023Updated 2 years ago
- OASIS TC Open Repository: Match STIX content against STIX patterns☆46Aug 1, 2022Updated 3 years ago
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆24Sep 24, 2019Updated 6 years ago
- Cyber Threat Intelligence☆74Dec 7, 2025Updated 2 months ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆20Sep 4, 2018Updated 7 years ago
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆260Feb 9, 2026Updated last week
- Decentralized Cyber Threat Intelligence Kaizen Framework☆27Jan 31, 2022Updated 4 years ago
- ☆20Oct 31, 2020Updated 5 years ago