This repo contains example of raw event examples and possible translations to the OCSF schema.
☆55Jul 31, 2025Updated 7 months ago
Alternatives and similar repositories for examples
Users that are interested in examples are comparing it to the libraries listed below
Sorting:
- ☆35Feb 27, 2025Updated last year
- OCSF Schema☆783Updated this week
- CloudZero Account provisioning automation for AWS☆14Dec 12, 2025Updated 2 months ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Selective Disclosure JWT (SD-JWT) Draft 06 & Selective Disclosure JWT VC (sd-jwt-vc) Draft 01 implementation☆16Jul 30, 2024Updated last year
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- Compare vulnerability scanners results (to make them better!)☆27Updated this week
- ☆49Feb 22, 2023Updated 3 years ago
- CLI migration utility to migrate Grafana content to Amazon Managed Grafana☆29Mar 27, 2025Updated 11 months ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆34Feb 12, 2026Updated 2 weeks ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Nov 13, 2025Updated 3 months ago
- Open Authorization API (OAA) development libraries, connectors and resources.☆17Jan 9, 2025Updated last year
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆37Dec 11, 2024Updated last year
- Standard library of blueprints for stacker☆35Jun 13, 2022Updated 3 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- Graph AWS resources in Neptune☆88Feb 6, 2024Updated 2 years ago
- Repository for the mijn.amsterdam.nl portal☆11Updated this week
- dbc is the command-line tool for installing and managing ADBC drivers☆92Updated this week
- Ansible-based deployment automation for the OpenConext platform☆14Updated this week
- ☆45Aug 26, 2025Updated 6 months ago
- OPI5 open micro desk design.☆13Mar 6, 2023Updated 2 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- User Feedback Space of #MitreAssistant☆38May 19, 2023Updated 2 years ago
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆532Feb 15, 2026Updated 2 weeks ago
- ☆12Jan 17, 2023Updated 3 years ago
- A specification for DID create/update/deactivate operations.☆11Jan 3, 2025Updated last year
- ☆12Jun 17, 2024Updated last year
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- How to use OpenAI API?☆12Nov 23, 2023Updated 2 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Apr 15, 2024Updated last year
- ☆11Jan 28, 2024Updated 2 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- ☆12Jul 8, 2025Updated 7 months ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- Control your Amazon Echo Smart Home devices using Siri and HomeKit.☆11Sep 17, 2017Updated 8 years ago