Stars
13
Forks
6
Language
HTML
Last Updated
Jul 13, 2022
Similar Repos
Repo | Language | Stars | Description | Updated At |
---|---|---|---|---|
None | 1174 | Cyber Threat Intelligence Repository expressed in STIX 2.0 | Aug 10, 2022 | |
None | 2 | Cyber Threat Intelligence Repository expressed in STIX 2.0 | Nov 29, 2023 | |
Python | 47 | OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x … | Apr 11, 2023 | |
Jupyter Notebook | 27 | OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and … | Apr 11, 2023 | |
None | 53 | OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order … | Mar 25, 2023 | |
None | 2 | OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order … | Nov 29, 2023 | |
Python | 2 | Any Threat Intelligence to STIX (ATIS) autogenerates and enriches STIX bundles with data from open … | Dec 11, 2022 | |
None | 16 | Cyber Threat Intelligence Data, Indicators, and Analysis | Jul 12, 2022 | |
HTML | 24 | stix-icons is a collection of colourful and clean icons for use in software, training and … | Mar 16, 2023 | |
None | 350 | Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers | Apr 23, 2023 | |
JavaScript | 118 | Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized) | Apr 15, 2023 | |
Python | 19 | OASIS TC Open Repository: Validate patterns used to express cyber observable content in STIX Indicators | Jan 20, 2023 | |
None | 2 | Tips for performing Threat Modeling and implementing it in your Pentest | Pentest report template … | Aug 28, 2023 | |
Scala | 2 | Functional and Reactive Domain Modeling | Mar 07, 2018 | |
Scala | 2 | "Functional and Reactive Domain Modeling" | Dec 31, 2021 | |
Elixir | 209 | OMG-Network repository of Watcher and Watcher Info | Sep 01, 2022 | |
JavaScript | 659 | Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups | Apr 25, 2023 | |
None | 3 | Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups | Jan 29, 2022 | |
None | 2 | Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups | Feb 12, 2022 | |
None | 2 | Collection of Cyber Threat Intelligence sources from the deep and dark web | Nov 13, 2022 | |
None | 2 | Collection of Cyber Threat Intelligence sources from the deep and dark web | Feb 14, 2023 | |
None | 2110 | Collection of Cyber Threat Intelligence sources from the deep and dark web | May 05, 2023 | |
None | 2 | Collection of Cyber Threat Intelligence sources from the deep and dark web | Feb 09, 2023 | |
None | 3 | Collection of Cyber Threat Intelligence sources from the deep and dark web | Mar 25, 2023 | |
None | 2 | Collection of Cyber Threat Intelligence sources from the deep and dark web | Jan 10, 2023 | |
None | 3 | Collection of Cyber Threat Intelligence sources from the deep and dark web | Jul 07, 2023 | |
None | 2 | Collection of Cyber Threat Intelligence sources from the deep and dark web | May 30, 2023 | |
None | 3 | Collection of Cyber Threat Intelligence sources from the deep and dark web | Jun 08, 2023 | |
None | 2 | Collection of Cyber Threat Intelligence sources from the deep and dark web | Aug 08, 2023 | |
None | 5 | Collection of Cyber Threat Intelligence sources from the deep and dark web | Nov 03, 2023 | |
Kotlin | 2 | Fmodel demo - Functional and Algebraic Domain modeling | Apr 19, 2023 | |
None | 4 | Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information … | Dec 23, 2022 | |
Scala | 456 | Code repo for Functional and Reactive Domain Modeling | Apr 06, 2023 | |
Scala | 106 | Additional accompaniment to Functional and Reactive Domain Modeling | Nov 20, 2022 | |
C# | 15 | Some examples showing domain modeling tips and traps | Aug 19, 2022 | |
MATLAB | 2 | Modeling two-phase flow and transport in porous media using MATLAB. | Apr 12, 2023 | |
None | 2 | physical optics: integrated modeling, phase retrieval, segmented systems, polynomials and fitting, ... | Dec 15, 2023 | |
None | 6 | 🏴☠️ Use attacker personas to improve your threat modeling and cybersecurity practices | Feb 08, 2023 | |
SCSS | 83 | OASIS TC Open Repository: GitHub Pages site for STIX and TAXII | Mar 19, 2023 | |
Jupyter Notebook | 14 | Frequency and time domain EM forward modeling and inversion program | Mar 14, 2023 | |
Kotlin | 171 | Functional, Algebraic and Reactive domain modeling with Kotlin (Multiplatform) | Apr 27, 2023 | |
Java | 3 | f(model) - Functional and Reactive domain modeling with Java | Mar 12, 2023 | |
JavaScript | 5 | This repository hosts a persona based privacy threat modeling solution called Models of Applied Privacy … | Jan 20, 2023 | |
JavaScript | 107 | OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships | Apr 20, 2023 | |
ANTLR | 90 | OASIS TC Open Repository: Non-normative schemas and examples for STIX 2 | Mar 16, 2023 | |
HTML | 2 | Time and frequency domain forward modeling and inversion of seismic wave | Mar 15, 2020 | |
Kotlin | 2 | Fmodel demo - Functional and Algebraic Domain modeling - State stored flavour | Apr 19, 2023 | |
Python | 129 | physical optics: integrated modeling, phase retrieval, segmented systems, polynomials and fitting, sequential raytracing... | Oct 08, 2022 | |
None | 2 | Repository for threat hunting and detection queries, tools, etc. | Apr 10, 2023 | |
None | 258 | A collection of papers, blogs, and resources that make up the quintessential aspects of cyber … | Jun 16, 2022 |