Here are
67 public repositories
matching this topic...
MISP (core software) - Open Source Threat Intelligence and Sharing Platform (formely known as Malware Information Sharing Platform)
Open Cyber Threat Intelligence Platform
-
Updated
Jul 25, 2020
-
JavaScript
Web app that provides basic navigation and annotation of ATT&CK matrices
-
Updated
Jul 16, 2020
-
TypeScript
Cyber Threat Intelligence Repository expressed in STIX 2.0
-
Updated
Jul 15, 2020
-
Python
The work on GreuhZbugs Liberation Mission for Arma 3 continues...
OASIS TC Open Repository: Python APIs for STIX 2
-
Updated
Jul 25, 2020
-
Python
Scripts and a (future) library to improve users' interactions with the ATT&CK content
-
Updated
Jul 21, 2020
-
Python
TAXII server implementation in Python from EclecticIQ
-
Updated
Jun 30, 2020
-
Python
Battle proven FreeSWITCH Event Socket Protocol client implementation with Gevent
-
Updated
Jul 7, 2020
-
Python
TAXII client implementation from EclecticIQ
-
Updated
Jun 30, 2020
-
Python
OASIS TC Open Repository: TAXII 2 Client Library Written in Python
-
Updated
Jul 17, 2020
-
Python
OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships
-
Updated
Jun 10, 2020
-
JavaScript
OASIS TC Open Repository: Non-normative schemas and examples for STIX 2
-
Updated
Jul 24, 2020
-
ANTLR
OASIS TC Open Repository: GitHub Pages site for STIX, CybOX, and TAXII
OASIS TC Open Repository: TAXII 2 Server Library Written in Python
-
Updated
Jul 7, 2020
-
Python
-
Updated
Jul 23, 2020
-
Python
ATT&CK Evaluations website
-
Updated
Jul 23, 2020
-
HTML
Data exfiltration utility for testing detection capabilities
-
Updated
Mar 8, 2020
-
Python
Modification of BECTI made by zerty for the JMW Arma 3 server
OASIS TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON
-
Updated
Jul 8, 2020
-
Python
Graph Representation of MITRE ATT&CK's CTI data
-
Updated
Nov 14, 2019
-
Python
OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices
-
Updated
Jul 20, 2020
-
Python
SDK and command line utility for enumerate leaked credentials on the wild.
☎️ UC micro service for Wazo
-
Updated
Jul 24, 2020
-
Python
Seamless Threat Intelligence Platform
-
Updated
Jul 22, 2020
-
Python
ICTCore: Unified Communications Framework for CTI
-
Updated
May 15, 2020
-
Java
STIX2 graph visualisation library in JS
-
Updated
Jul 16, 2020
-
HTML
-
Updated
Jul 17, 2020
-
Python
Improve this page
Add a description, image, and links to the
cti
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
cti
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.