YETI is a proof-of-concept implementation of Trusted Automated eXchange of Indicator Information (TAXII) that supports the Inbox, Poll and Discovery services defined by the TAXII Services Specification. It was written for Python 2.7 and utilizes the Django 1.7 web application framework. YETI was created to help developers implement and test their own TAXII applications and help non-developers learn more about TAXII.
NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.
A library of event-based analytics written in EQL to detect adversary behaviors, now integrated into the Detection Engine of Kibana.
A PowerShell script to interact with the MITRE ATT&CK Framework via its own API using the deprecated MediaWiki API.
An all-in-one email outreach platform for finding and connecting with professionals, with features for lead discovery, email verification, and cold email campaigns.
AbuseHelper is an open-source framework for receiving and redistributing abuse feeds and threat intel.
A framework for managing cyber threat intelligence in structured formats.
A system for collecting, managing, and distributing security information on a large scale, developed by CERT Polska.
CAPECâ„¢ is a comprehensive dictionary of known attack patterns used by adversaries to exploit weaknesses in cyber-enabled capabilities.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.