cyentific-rni / cacao-json-schemasView external linksLinks
JSON schemas for validating CACAO Security Playbooks. Note: In December 2023, Cyentific AS offered and transferred the content of this repository to the GitHub of the OASIS CACAO TC (https://github.com/oasis-open/cacao-json-schemas), which will be further maintained as an open-source product.
☆19Dec 15, 2023Updated 2 years ago
Alternatives and similar repositories for cacao-json-schemas
Users that are interested in cacao-json-schemas are comparing it to the libraries listed below
Sorting:
- ☆19Jul 28, 2025Updated 6 months ago
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆31Jan 16, 2024Updated 2 years ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Aug 24, 2022Updated 3 years ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆102Feb 9, 2026Updated last week
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- A golang JSON canonicalization scheme library based on RFC 8785☆24Oct 16, 2023Updated 2 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Golang io/fs implementation for Google Cloud Storage☆12Jan 20, 2024Updated 2 years ago
- Kaitai Struct YAML (KSY) schema specification☆15Sep 12, 2025Updated 5 months ago
- A linter for ksy files.☆11Aug 15, 2021Updated 4 years ago
- Simple drag and drop using native event API for Vue 3☆13Nov 13, 2023Updated 2 years ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆37Dec 15, 2022Updated 3 years ago
- This package provides an S3 implementation for Go1.16 filesystem interface.☆13Apr 21, 2025Updated 9 months ago
- A simple linter for Sigma rules☆13Oct 22, 2020Updated 5 years ago
- API for parsing binary files using a predefined grammar☆15Nov 17, 2016Updated 9 years ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆90Mar 2, 2021Updated 4 years ago
- kaitaigo is a compiler and runtime to create Go parsers from Kaitai Struct files☆18Apr 20, 2022Updated 3 years ago
- A Go implementation and parser for Sigma rules.☆95May 15, 2025Updated 9 months ago
- OASIS OpenC2 TC: Repository for submitting and reviewing OpenC2 use cases relevant to the work of the OpenC2 Language Subcommittee (LSC)☆30Apr 20, 2022Updated 3 years ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆33Updated this week
- AFF4 Standard Documents☆29Feb 4, 2022Updated 4 years ago
- An NTFS file parser in Go☆73Mar 22, 2025Updated 10 months ago
- OCA-wide documentation shared by all sub-projects and repositories☆33Oct 31, 2024Updated last year
- OASIS TC Open Repository: Non-normative schemas and examples for STIX 2☆133Jan 19, 2026Updated 3 weeks ago
- A very customizable Countdown / Reminder app for macOS and iOS☆34Mar 31, 2023Updated 2 years ago
- Stemmer packages for Go programming language. Includes English, German and Dutch stemmers.☆54Dec 7, 2016Updated 9 years ago
- The Apache Storm implementation of the Bullet backend☆40Apr 17, 2023Updated 2 years ago
- A set of small utilities, helpers for PIN tracers☆36Updated this week
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 8 months ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Read a tar file contents using go1.16 io/fs abstraction☆46Nov 20, 2023Updated 2 years ago
- linux c++, fox-toolkit, multi-threaded forensic gui tool☆49Jul 19, 2024Updated last year
- This is a mapping of CPEs to package urls created by using VulnerableCode's data☆10Aug 14, 2020Updated 5 years ago
- Code to make a Delphi program act as another user. Demo provide to access a file owned by another user.☆11Feb 8, 2022Updated 4 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- ☆10Mar 31, 2021Updated 4 years ago