ocsf / examplesLinks
This repo contains example of raw event examples and possible translations to the OCSF schema.
☆51Updated 5 months ago
Alternatives and similar repositories for examples
Users that are interested in examples are comparing it to the libraries listed below
Sorting:
- ☆35Updated 10 months ago
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆32Updated last week
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆389Updated 2 weeks ago
- Built-in Panther detection rules and policies☆433Updated this week
- ☆51Updated last month
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆93Updated 3 weeks ago
- Knowledge Report Alert & Normalization Generator☆26Updated last month
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆169Updated this week
- OCSF Documentation☆151Updated 3 months ago
- A standard for reducing log volume without sacrificing analytical capability☆213Updated 10 months ago
- Command line tool for working with Panther rules and policies☆47Updated last week
- ☆49Updated 3 months ago
- Audit log wall of shame.☆41Updated 5 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Updated 3 years ago
- The SOCless automation framework☆140Updated 11 months ago
- ☆37Updated last week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Updated last year
- STIX2 graph visualisation library in JS☆95Updated 2 months ago
- ☆192Updated last week
- A Software as a Service (SaaS) log collection framework.☆180Updated this week
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆168Updated last week
- pocket guide for core detection engineering concepts☆31Updated 2 years ago
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆259Updated this week
- Python samples and utilities for Chronicle APIs☆88Updated 2 months ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆89Updated 4 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆86Updated 3 weeks ago
- OCSF Schema Validation☆12Updated last year
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated 2 months ago
- Stakeholder-Specific Vulnerability Categorization☆168Updated last week
- Graph-based security analysis for everyone☆354Updated last month