oasis-tcs / cacao
OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao
☆28Updated last year
Alternatives and similar repositories for cacao:
Users that are interested in cacao are comparing it to the libraries listed below
- ☆27Updated 4 years ago
- Home for TRANSITS materials☆23Updated 8 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆39Updated 10 months ago
- ☆19Updated last month
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆51Updated last week
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆53Updated last week
- A web application for generating, parsing and validating, manipulating, and visualizing CACAO v2.0 playbooks.☆28Updated 3 months ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated last year
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆31Updated 2 years ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆61Updated last month
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated last week
- JSON schemas for validating CACAO Security Playbooks. Note: In December 2023, Cyentific AS offered and transferred the content of this re…☆18Updated last year
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated 4 months ago
- ☆18Updated 3 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆110Updated 4 months ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆34Updated this week
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated 11 months ago
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆58Updated 4 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆66Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Updated 11 months ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆49Updated 2 weeks ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 2 years ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆81Updated 4 years ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 5 months ago
- Notes on managing and coordinating the response to major cyber incidents☆40Updated 4 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 2 months ago