This repo contains example of raw event examples and possible translations to the OCSF schema.
☆56Jul 31, 2025Updated 7 months ago
Alternatives and similar repositories for examples
Users that are interested in examples are comparing it to the libraries listed below
Sorting:
- OCSF Schema☆797Updated this week
- ☆35Feb 27, 2025Updated last year
- OCSF Schema Validation☆12Dec 13, 2024Updated last year
- ☆32Nov 19, 2024Updated last year
- CloudZero Account provisioning automation for AWS☆14Dec 12, 2025Updated 3 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆136Jul 19, 2024Updated last year
- OASIS TC Open Repository: TAXII 2 Server Library Written in Python☆137Apr 15, 2024Updated last year
- GitHub action that validates the syntax of selected RDF files in the repository☆12Feb 12, 2024Updated 2 years ago
- For use in our Tenable.IO to AWS Security Hub integration☆29Sep 4, 2025Updated 6 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Feb 2, 2025Updated last year
- OCSF Documentation☆158Jan 29, 2026Updated last month
- About the ETHOS open source initiative☆25Apr 26, 2023Updated 2 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- Structured Threat Intelligence Graph☆99Dec 30, 2025Updated 2 months ago
- User Feedback Space of #MitreAssistant☆38May 19, 2023Updated 2 years ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- ☆48Feb 22, 2023Updated 3 years ago
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- Python scripts for setting up private LLM's on local and in the cloud with LangChain, GPT4All and Cerebrium☆11May 29, 2023Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Summarize CTI reports with OpenAI☆18Mar 16, 2026Updated last week
- ☆29Feb 25, 2017Updated 9 years ago
- ☆11Jun 7, 2025Updated 9 months ago
- CLI migration utility to migrate Grafana content to Amazon Managed Grafana☆29Mar 27, 2025Updated 11 months ago
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆536Updated this week
- Ansible playbook for installing MineMeld on Linux☆47Mar 18, 2021Updated 5 years ago
- A Software as a Service (SaaS) log collection framework.☆184Updated this week
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- This repository contains a few examples of actions that can be added to rules within Elastic Security.☆24Feb 6, 2025Updated last year
- Let's create and share kaleidoscopes on the web.☆18Oct 7, 2023Updated 2 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Helm chart for Open Cyber Threat Intelligence Platform☆35Mar 10, 2026Updated last week
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Apr 15, 2024Updated last year
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 3 months ago
- ☆11Dec 26, 2022Updated 3 years ago
- Sigma Detection Rule Repository☆92Jun 18, 2020Updated 5 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆98Jun 4, 2025Updated 9 months ago
- Use dask to fetch data from Elasticsearch in parallel by sending the request to each shard separatelly.☆20Jan 2, 2021Updated 5 years ago