Loading...
YETI is a proof-of-concept TAXII implementation that supports Inbox, Poll, and Discovery services for automated cyber threat intelligence indicator exchange.

YETI is a proof-of-concept TAXII implementation that supports Inbox, Poll, and Discovery services for automated cyber threat intelligence indicator exchange.
YETI is a proof-of-concept implementation of the Trusted Automated eXchange of Indicator Information (TAXII) protocol. The tool supports three core TAXII services: Inbox, Poll, and Discovery services as defined by the TAXII Services Specification. Built using Python 2.7 and the Django 1.7 web application framework, YETI provides developers with a reference implementation for building and testing TAXII-compliant applications. The tool enables automated exchange of cyber threat intelligence indicators between organizations and security systems. YETI serves as both a learning resource for understanding TAXII protocol mechanics and a development foundation for creating custom threat intelligence sharing platforms. The implementation focuses on helping developers understand the technical requirements and data structures involved in TAXII-based threat intelligence exchange.
Common questions about YETI including features, pricing, alternatives, and user reviews.
YETI is YETI is a proof-of-concept TAXII implementation that supports Inbox, Poll, and Discovery services for automated cyber threat intelligence indicator exchange.. It is a Threat Management solution designed to help security teams with Threat Sharing, Python, Threat Intelligence.
Cybercrime intelligence tools for searching compromised credentials from infostealers
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
Threat intelligence database with 500M+ malicious IPs, domains, and IOCs via API
Swiss-made darknet monitoring platform providing real-time threat intel via API
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
Get strategic cybersecurity insights in your inbox