STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling
☆33Dec 9, 2024Updated last year
Alternatives and similar repositories for cti-stix-diamond-activity-attack-graph
Users that are interested in cti-stix-diamond-activity-attack-graph are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 4 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Apr 15, 2024Updated 2 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆51Nov 14, 2019Updated 6 years ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Apr 19, 2025Updated 11 months ago
- STIX 2.x Java Library☆30Nov 16, 2022Updated 3 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆11Jun 12, 2023Updated 2 years ago
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆24Sep 24, 2019Updated 6 years ago
- ☆20Apr 10, 2025Updated last year
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- ☆16Aug 29, 2025Updated 7 months ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 6 years ago
- Augmentation to Machine Readable CTI☆39Sep 9, 2025Updated 7 months ago
- This repository contains generated contextual data utilized by pyattck.☆19Mar 3, 2025Updated last year
- User Feedback Space of #MitreAssistant☆38May 19, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- ☆25Jun 11, 2021Updated 4 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆129Jan 9, 2023Updated 3 years ago
- provides a Suricata Eve output for Kafka with Suricate Eve plugin☆15Nov 25, 2021Updated 4 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Nov 15, 2023Updated 2 years ago
- Rapports techniques de VIGINUM☆36Sep 15, 2025Updated 7 months ago
- Parses the FireEye HX .mans triage collections and sends them to ElasticSearch☆17Feb 17, 2023Updated 3 years ago
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 4 months ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- ☆21Oct 31, 2020Updated 5 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- ACT documentation repo☆17May 22, 2024Updated last year
- Public release of Whalehoney Honeypot☆29Mar 21, 2022Updated 4 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago