search
ATIS: Malware Analysis and STIX Data Transformation

Any Threat Intelligence to STIX (ATIS)

CATCH: Comprehensive Telemetry Analysis and Threat Intelligence Framework for Advanced Security

Collect, analyze, and report on anomalous telemetry data with the CATCH CLI and CGUI, integrating Neo4j and STIX 2.1 for standardized, actionable intelligence.

EMV: Exploit, Malware, and Vulnerability Scoring GUI

A customizable application that allows users to create and apply their own scoring schema to cyber issues, interfacing with STIX objects and supporting export functions.

ESE: Comprehensive STIX1-to-STIX2 Conversion Tool

Enhanced STIX Elevator (ESE)

INLQOSD: Wireless Network Quality of Service and Security Dataset

A Tool for Simulating and Analyzing Wireless Networks to Optimize Performance and Security

PSSE for Human Factor Research

Enhancing Operator Performance Through Real-Time Grid Simulation

STAR: Structured Threat Automated Response

Automates response actions for cybersecurity threats by executing STIX Course of Action objects in Python.

STIG: Graph-Based Threat Intelligence and Response System

Structured Threat Intelligence Graph (STIG)

STIXEnforcer: Advanced STIX 2.1 Data Enrichment and Error Correction Tool

Structured Threat Information Expression Style Enforcer

STOAT: Automated Scoring Tool for Software Weaknesses

Scoring Threat Object Analysis Tool (STOAT)

Storm DEPART: Damage Estimate Prediction and Recovery Tool

Storm DEPART provides predictive damage assessments and resource allocation models to optimize pre-incident planning and recovery for power generation and distribution networks.

STOTS: Network Threat Analysis and Visualization Suite

Structured Threat Observation Tool Set (STOTS)