OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao
☆32Jan 16, 2024Updated 2 years ago
Alternatives and similar repositories for cacao
Users that are interested in cacao are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- JSON schemas for validating CACAO Security Playbooks. Note: In December 2023, Cyentific AS offered and transferred the content of this re…☆19Dec 15, 2023Updated 2 years ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Aug 24, 2022Updated 3 years ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- ☆19Jul 28, 2025Updated 8 months ago
- Augmentation to Machine Readable CTI☆39Sep 9, 2025Updated 7 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A web application for generating, parsing and validating, manipulating, visualizing and executing CACAO v2.0 playbooks.☆39Aug 27, 2025Updated 7 months ago
- OASIS OpenC2 TC: Repository for submitting and reviewing OpenC2 use cases relevant to the work of the OpenC2 Language Subcommittee (LSC)☆30Apr 20, 2022Updated 3 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Apr 15, 2024Updated 2 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆19Oct 18, 2016Updated 9 years ago
- Passive DNS Common Output Format☆37Aug 30, 2024Updated last year
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆92Mar 2, 2021Updated 5 years ago
- OASIS OpenC2 TC: GitHub repository used to propose and track changes to the OpenC2 Language Specification as new working draft level revi…☆17May 9, 2024Updated last year
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 9 months ago
- Repo of KC7 challenge scenarios☆27Aug 30, 2025Updated 7 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Collaborative Open Playbook Standard☆160Dec 29, 2025Updated 3 months ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆99Jun 4, 2025Updated 10 months ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- STIX 2.1 Data Modeling Tool☆27Jul 2, 2024Updated last year
- Snort rule parser/validator written in python.☆20May 16, 2023Updated 2 years ago
- External telegram feeder for AIL framework☆18Jan 21, 2026Updated 2 months ago
- A list of Per-Reviewed Journals, Books and Blogs on intelligence and Cybersecurity☆25Apr 1, 2024Updated 2 years ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆102Mar 2, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- ☆30Mar 3, 2021Updated 5 years ago
- Python API for the LimaCharlie.io service.☆22Updated this week
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆91Apr 7, 2026Updated last week
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆22Nov 22, 2021Updated 4 years ago
- Collection of dynamic security related helpers☆16Dec 9, 2022Updated 3 years ago
- Deep and Dark Web OSINT Tool☆10Sep 18, 2018Updated 7 years ago
- ☆16Mar 19, 2026Updated 3 weeks ago
- Remove EXIF data from all objects in an S3 bucket☆16Mar 16, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆984Aug 26, 2024Updated last year
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆28Oct 10, 2023Updated 2 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- Seamless Threat Intelligence Platform☆47Jan 29, 2024Updated 2 years ago
- ☆27Jul 25, 2025Updated 8 months ago
- ☆14Jun 26, 2020Updated 5 years ago
- ☆43Nov 30, 2022Updated 3 years ago