cti-stix-elevatorOASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON
Stars: ✭ 42 (+200%)
cti-pattern-validatorOASIS TC Open Repository: Validate patterns used to express cyber observable content in STIX Indicators
Stars: ✭ 18 (+28.57%)
cti-stix2-json-schemasOASIS TC Open Repository: Non-normative schemas and examples for STIX 2
Stars: ✭ 75 (+435.71%)
cti-stix-generatorOASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/cti-stix-generator
Stars: ✭ 27 (+92.86%)
attack-evalsATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (+307.14%)
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+24792.86%)
Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (+171.43%)
dendrol🌴 The STIX2 Pattern expression parser for humans
Stars: ✭ 23 (+64.29%)
connectorsOpenCTI connectors
Stars: ✭ 135 (+864.29%)
YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (+57.14%)
CoreFree, easy to setup PBX for small business based on Asterisk 16 core
Stars: ✭ 190 (+1257.14%)
cycat-serviceCyCAT.org API back-end server including crawlers
Stars: ✭ 25 (+78.57%)
libstix2APIs for generating STIX 2.1 and TAXII 2.1 messages with Go (Golang)
Stars: ✭ 38 (+171.43%)
stix2-graphicsGraphics, icons, and diagrams to support STIX 2
Stars: ✭ 32 (+128.57%)
FlexTransformEnables dynamic translation of structured data between formats
Stars: ✭ 14 (+0%)
Reverse-EngineeringA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+51571.43%)
ictcoreICTCore: Unified Communications Framework for web developers. Communications APIs for voice calls, SMS messaging, Fax communications and Emails
Stars: ✭ 18 (+28.57%)
attack to verisThe principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Stars: ✭ 56 (+300%)
pywhatcmsUnofficial WhatCMS API package
Stars: ✭ 42 (+200%)
serverA cyber threat intelligence server based on TAXII 2 and written in Golang
Stars: ✭ 28 (+100%)
OpenctiAuthors
Stars: ✭ 2,165 (+15364.29%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+49057.14%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (+550%)
IntelowlIntel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+15000%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+41064.29%)