search
ATIS: Malware Analysis and STIX Data Transformation

Any Threat Intelligence to STIX (ATIS)

Automated NVD Vulnerability Search to STIX Bundle Translator

Convert National Vulnerability Database searches into structured STIX data for enhanced security intelligence and analysis.

CATCH: Comprehensive Telemetry Analysis and Threat Intelligence Framework for Advanced Security

Collect, analyze, and report on anomalous telemetry data with the CATCH CLI and CGUI, integrating Neo4j and STIX 2.1 for standardized, actionable intelligence.

EMV: Exploit, Malware, and Vulnerability Scoring GUI

A customizable application that allows users to create and apply their own scoring schema to cyber issues, interfacing with STIX objects and supporting export functions.

ESE: Comprehensive STIX1-to-STIX2 Conversion Tool

Enhanced STIX Elevator (ESE)

STAR: Structured Threat Automated Response

Automates response actions for cybersecurity threats by executing STIX Course of Action objects in Python.

STIG: Graph-Based Threat Intelligence and Response System

Structured Threat Intelligence Graph (STIG)

STIXEnforcer: Advanced STIX 2.1 Data Enrichment and Error Correction Tool

Structured Threat Information Expression Style Enforcer

STOAT: Automated Scoring Tool for Software Weaknesses

Scoring Threat Object Analysis Tool (STOAT)

Storm DEPART: Damage Estimate Prediction and Recovery Tool

Storm DEPART provides predictive damage assessments and resource allocation models to optimize pre-incident planning and recovery for power generation and distribution networks.

STOTS: Network Threat Analysis and Visualization Suite

Structured Threat Observation Tool Set (STOTS)