DOGESEC Logo

Stixify. Extract machine readable intelligence from unstructured data.

We build software for cyber threat intelligence analysts.

CTI Butler

A database of MITRE ATT&CK, MITRE CAPEC, MITRE CWE, NVD CVE, NVD CPE, Sigma Rules, YARA Rules, DISARM Framework data as STIX 2.1 objects.

A database of MITRE ATT&CK, MITRE CAPEC, MITRE CWE, NVD CVE, NVD CPE, Sigma Rules, YARA Rules, DISARM Framework data as STIX 2.1 objects.

Obstracts

The RSS reader for threat intelligence teams. Turn any blog into machine readable STIX 2.1 data ready for use with your security stack.

Obstracts. The RSS reader for threat intelligence teams.

Stixify

Your automated threat intelligence analyst. Extract machine readable STIX 2.1 data ready for use with your security stack.

Stixify. Your automated threat intelligence analyst.

Vulmatch

Straightforward vulnerability management. Know when software you use is vulnerable, how it is being exploited, and how to detect an attack.

Vulmatch. Straightforward vulnerability management.

SIEM Rules

Your detection engineering database. View, modify, and deploy rules for threat detection and threat hunting.

SIEM Rules. Your detection engineering database.

Open-Source Projects

All DOGESEC commercial products are built in-part from code-bases we have made available under permissive licenses.

DOGESEC Github