cyentific-rni / stix2.1-coa-playbook-extensionView external linksLinks
A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-readable security playbooks such as CACAO Security Playbooks
☆23Dec 11, 2023Updated 2 years ago
Alternatives and similar repositories for stix2.1-coa-playbook-extension
Users that are interested in stix2.1-coa-playbook-extension are comparing it to the libraries listed below
Sorting:
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Aug 24, 2022Updated 3 years ago
- JSON schemas for validating CACAO Security Playbooks. Note: In December 2023, Cyentific AS offered and transferred the content of this re …☆19Dec 15, 2023Updated 2 years ago
- ☆19Jul 28, 2025Updated 6 months ago
- A web application for generating, parsing and validating, manipulating, visualizing and executing CACAO v2.0 playbooks.☆39Aug 27, 2025Updated 5 months ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- ☆25Jul 12, 2023Updated 2 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- ☆19Aug 6, 2021Updated 4 years ago
- ☆44Oct 16, 2025Updated 4 months ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆90Mar 2, 2021Updated 4 years ago
- Firepit - STIX Columnar Storage☆17Jun 5, 2024Updated last year
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- A pure Go library for working with Structured Threat Information Expression (STIX™) version 2.x data☆27Apr 27, 2025Updated 9 months ago
- TAXII server implementation in Python from EclecticIQ☆211Jan 5, 2026Updated last month
- ☆34Jan 30, 2025Updated last year
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆31Jan 16, 2024Updated 2 years ago
- OASIS OpenC2 TC: Repository for submitting and reviewing OpenC2 use cases relevant to the work of the OpenC2 Language Subcommittee (LSC)☆30Apr 20, 2022Updated 3 years ago
- KEV EPSS Data☆31Updated this week
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated this week
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆33Updated this week
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆64Jul 15, 2020Updated 5 years ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Apr 15, 2024Updated last year
- Sandbox samples and monitor them with kunai☆29Jun 24, 2025Updated 7 months ago
- Global Security Database Project☆28Mar 4, 2023Updated 2 years ago
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆39Updated this week
- The Dissect module tying all other Dissect modules together. It provides a programming API and command line tools which allow easy access…☆79Updated this week
- Translate STIX 2 Patterning Queries☆31Oct 4, 2018Updated 7 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆33Jan 1, 2023Updated 3 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- ☆30Mar 3, 2021Updated 4 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆37Dec 15, 2022Updated 3 years ago
- ☆14Nov 11, 2014Updated 11 years ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆34Apr 20, 2023Updated 2 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆50Aug 30, 2025Updated 5 months ago
- This repository wraps the KustoSchemaTools into a CLI tool inside a container. This way it can be used as GitHub Action☆11Oct 21, 2025Updated 3 months ago