
YETI is a proof-of-concept TAXII implementation that supports Inbox, Poll, and Discovery services for automated cyber threat intelligence indicator exchange.

YETI is a proof-of-concept TAXII implementation that supports Inbox, Poll, and Discovery services for automated cyber threat intelligence indicator exchange.
YETI is a proof-of-concept implementation of the Trusted Automated eXchange of Indicator Information (TAXII) protocol. The tool supports three core TAXII services: Inbox, Poll, and Discovery services as defined by the TAXII Services Specification. Built using Python 2.7 and the Django 1.7 web application framework, YETI provides developers with a reference implementation for building and testing TAXII-compliant applications. The tool enables automated exchange of cyber threat intelligence indicators between organizations and security systems. YETI serves as both a learning resource for understanding TAXII protocol mechanics and a development foundation for creating custom threat intelligence sharing platforms. The implementation focuses on helping developers understand the technical requirements and data structures involved in TAXII-based threat intelligence exchange.
Common questions about YETI including features, pricing, alternatives, and user reviews.
YETI is YETI is a proof-of-concept TAXII implementation that supports Inbox, Poll, and Discovery services for automated cyber threat intelligence indicator exchange. It is a Threat Management solution designed to help security teams with Threat Sharing, Open Source, Cyber Threat Intelligence.
YETI is a free Threat Management tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/TAXIIProject/yeti/ for download and installation instructions.
Popular alternatives to YETI include:
Compare these tools and more at https://cybersectools.com/categories/threat-management
YETI is for security teams and organizations that need Threat Sharing, Open Source, Cyber Threat Intelligence, Taxii, Proof Of Concept. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Threat Management tools can be found at https://cybersectools.com/categories/threat-management
Cybercrime intelligence tools for searching compromised credentials from infostealers