Swagger/ OpenAPI specifications for security products and services
☆77Feb 9, 2026Updated 2 weeks ago
Alternatives and similar repositories for openapi-apps
Users that are interested in openapi-apps are comparing it to the libraries listed below
Sorting:
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆123Feb 20, 2026Updated last week
- Documentation used for Shuffle☆21Feb 19, 2026Updated last week
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- A repository used as a Go module to help out with Shuffle development, and to ensure we reuse code structures everywhere.☆14Feb 19, 2026Updated last week
- A Golang API for TheHive☆13Sep 3, 2020Updated 5 years ago
- Collaborative, web-based case management for incident response☆24Jan 23, 2024Updated 2 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- A curated list of awesome things related to TheHive & Cortex☆185Oct 9, 2021Updated 4 years ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,199Updated this week
- Examples from Medium blogposts☆16Mar 7, 2023Updated 2 years ago
- A repository to share contributions related to TheHive Project☆22Sep 15, 2021Updated 4 years ago
- JSON schemas for validating CACAO Security Playbooks. Note: In December 2023, Cyentific AS offered and transferred the content of this re…☆19Dec 15, 2023Updated 2 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated 11 months ago
- Alert notification plugin for Graylog to generate log messages from alerts☆27Jan 14, 2026Updated last month
- Pritunl Access Control System☆10Feb 16, 2023Updated 3 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- A knowledge base of actionable Incident Response techniques☆662May 31, 2022Updated 3 years ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆92Mar 2, 2021Updated 4 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- Remove EXIF data from all objects in an S3 bucket☆16Mar 16, 2021Updated 4 years ago
- Drill down into your python logs using JSON logs stored in Splunk - supports sending over TCP or the Splunk HEC REST API handlers (using …☆13Oct 18, 2022Updated 3 years ago
- OASIS TC Open Repository: A GitHub public repository for development of a python library to transform between data-interchange formats (s…☆14Feb 10, 2022Updated 4 years ago
- Proof of Value Terraform Scripts to utilize Amazon Web Services (AWS) Security, Identity & Compliance Services to Support your AWS Accoun…☆16Apr 26, 2020Updated 5 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆55Jul 20, 2023Updated 2 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Test harness for a more pleasurable app building experience☆14Sep 30, 2020Updated 5 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- Proof of concept incident response demo using SSM and AWS Fargate.☆14Dec 5, 2019Updated 6 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Command line $MFT record decoder☆12May 20, 2017Updated 8 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 2 months ago
- Python API Client for TheHive☆237Feb 8, 2026Updated 2 weeks ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- ☆19Jul 28, 2025Updated 6 months ago
- ☆18Mar 26, 2025Updated 11 months ago