All Projects → eclecticiq → stix-icons

eclecticiq / stix-icons

Licence: other
stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats according to the STIX language for intelligence exchange, defined by OASIS Cyber Threat Intelligence (CTI) TC

Programming Languages

HTML
75241 projects
CSS
56736 projects

Projects that are alternatives of or similar to stix-icons

cti-stix-elevator
OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON
Stars: ✭ 42 (+200%)
Mutual labels:  stix, cti, cyber-threat-intelligence, stix2
cti-pattern-validator
OASIS TC Open Repository: Validate patterns used to express cyber observable content in STIX Indicators
Stars: ✭ 18 (+28.57%)
Mutual labels:  stix, cti, cyber-threat-intelligence, stix2
cti-stix-generator
OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/cti-stix-generator
Stars: ✭ 27 (+92.86%)
Mutual labels:  stix, cti, cyber-threat-intelligence, stix2
cti-stix2-json-schemas
OASIS TC Open Repository: Non-normative schemas and examples for STIX 2
Stars: ✭ 75 (+435.71%)
Mutual labels:  stix, cti, cyber-threat-intelligence, stix2
attack-stix-data
STIX data representing MITRE ATT&CK
Stars: ✭ 118 (+742.86%)
Mutual labels:  stix, cti, cyber-threat-intelligence
mitrecnd.github.io
MITRE Shield website
Stars: ✭ 17 (+21.43%)
Mutual labels:  cti, cyber-threat-intelligence
attack-evals
ATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (+307.14%)
Mutual labels:  cti, cyber-threat-intelligence
Misp
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+24792.86%)
Mutual labels:  stix, cti
Abused-Legitimate-Services
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Stars: ✭ 42 (+200%)
Mutual labels:  cti, cyber-threat-intelligence
mitreattack-python
A python module for working with ATT&CK
Stars: ✭ 208 (+1385.71%)
Mutual labels:  cti, cyber-threat-intelligence
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+51571.43%)
Mutual labels:  cyber-threat-intelligence
Core
Free, easy to setup PBX for small business based on Asterisk 16 core
Stars: ✭ 190 (+1257.14%)
Mutual labels:  cti
cycat-service
CyCAT.org API back-end server including crawlers
Stars: ✭ 25 (+78.57%)
Mutual labels:  cti
Benny-Edition-CTI-0.97-Zerty-Modification
Modification of BECTI made by zerty for the JMW Arma 3 server
Stars: ✭ 36 (+157.14%)
Mutual labels:  cti
dendrol
🌴 The STIX2 Pattern expression parser for humans
Stars: ✭ 23 (+64.29%)
Mutual labels:  stix2
ictcore
ICTCore: Unified Communications Framework for web developers. Communications APIs for voice calls, SMS messaging, Fax communications and Emails
Stars: ✭ 18 (+28.57%)
Mutual labels:  cti
client-python
OpenCTI Python Client
Stars: ✭ 45 (+221.43%)
Mutual labels:  cti
attack to veris
The principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Stars: ✭ 56 (+300%)
Mutual labels:  cyber-threat-intelligence
libstix2
APIs for generating STIX 2.1 and TAXII 2.1 messages with Go (Golang)
Stars: ✭ 38 (+171.43%)
Mutual labels:  stix
stix2-graphics
Graphics, icons, and diagrams to support STIX 2
Stars: ✭ 32 (+128.57%)
Mutual labels:  stix

STIX Icons

stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats according to the STIX language for intelligence exchange, defined by OASIS Cyber Threat Intelligence (CTI) TC

This collection is made available by EclecticIQ to stimulate the widespread adoption of STIX.

License

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Contributing

Feel free to add/create your own icons for custom STIX objects! It would be awesome if you provide merge requests for these additional icons so that everyone using this library has the ability to use the proper icons for your custom objects.

Content

Formats

The icons are provided in three versions: color, black, and white. On top of that there are two variations provided: with and without a 'circle' behind the icons. Within the folders below you can choose the icons that suite your needs.

  • colorCMYK: PDF files in CYMK format
  • colorRGB: colorRGB Icons
    • Normal:
      • PDF: Normal icons in PDF format
      • SVG: Normal icons in SVG format
      • PNG: Normal icons in PNG format in two sizes: 128 and 1024 pixels wide
    • Round:
      • PDF: Round icons in PDF format
      • SVG: Round icons in SVG format
      • PNG: Round icons in PNG format in two sizes: 128 and 1024 pixels wide
  • White: White Icons
    • Normal:
      • PDF: Normal icons in PDF format
      • SVG: Normal icons in SVG format
      • PNG: Normal icons in PNG format in two sizes: 128 and 1024 pixels wide
    • Round:
      • PDF: Round icons in PDF format
      • SVG: Round icons in SVG format
      • PNG: Round icons in PNG format in two sizes: 128 and 1024 pixels wide
  • Black: Black Icons
    • Normal:
      • PDF: Normal icons in PDF format
      • SVG: Normal icons in SVG format
      • PNG: Normal icons in PNG format in two sizes: 128 and 1024 pixels wide
    • Round:
      • PDF: Round icons in PDF format
      • SVG: Round icons in SVG format
      • PNG: Round icons in PNG format in two sizes: 128 and 1024 pixels wide

STIX Icon Overview

The following list shows all variations of the supported icons.

Object RGB RGB, circle Black Black, circle White White, circle
Attack Pattern Attack_Pattern Attack_Pattern Attack_Pattern Attack_Pattern Attack_Pattern Attack_Pattern
Campaign Campaign Campaign Campaign Campaign Campaign Campaign
Course of Action Course_of_Action Course_of_Action Course_of_Action Course_of_Action Course_of_Action Course_of_Action
Grouping Grouping Grouping Grouping Grouping Grouping Grouping
Identity Identity Identity Identity Identity Identity Identity
Incident Incident Incident Incident Incident Incident Incident
Indicator Indicator Indicator Indicator Indicator Indicator Indicator
Infrastructure Infrastructure Infrastructure Infrastructure Infrastructure Infrastructure Infrastructure
Intrusion Set Intrusion_Set Intrusion_Set Intrusion_Set Intrusion_Set Intrusion_Set Intrusion_Set
Location Location Location Location Location Location Location
Malware Malware Malware Malware Malware Malware Malware
Malware Analysis Malware_Analysis Malware_Analysis Malware_Analysis Malware_Analysis Malware_Analysis Malware_Analysis
Note Note Note Note Note Note Note
Observed Data Observed_Data Observed_Data Observed_Data Observed_Data Observed_Data Observed_Data
Opinion Opinion Opinion Opinion Opinion Opinion Opinion
Relationship Relationship Relationship Relationship Relationship Relationship Relationship
Report Report Report Report Report Report Report
Sighting Sighting Sighting Sighting Sighting Sighting Sighting
Threat Actor Threat_Actor Threat_Actor Threat_Actor Threat_Actor Threat_Actor Threat_Actor
Tool Tool Tool Tool Tool Tool Tool
Vulnerability Vulnerability Vulnerability Vulnerability Vulnerability Vulnerability Vulnerability
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].