OCSF Schema
☆790Feb 27, 2026Updated last week
Alternatives and similar repositories for ocsf-schema
Users that are interested in ocsf-schema are comparing it to the libraries listed below
Sorting:
- OCSF Documentation☆156Jan 29, 2026Updated last month
- This repo contains example of raw event examples and possible translations to the OCSF schema.☆56Jul 31, 2025Updated 7 months ago
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,658Jan 8, 2025Updated last year
- Built-in Panther detection rules and policies☆439Updated this week
- A standard for reducing log volume without sacrificing analytical capability☆214Feb 21, 2025Updated last year
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆389Jan 20, 2026Updated last month
- Detect Tactics, Techniques & Combat Threats☆2,264Jan 21, 2026Updated last month
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆324Sep 27, 2024Updated last year
- Main Sigma Rule Repository☆10,156Updated this week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆338Feb 13, 2026Updated 3 weeks ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,267Updated this week
- Open Source Security Events Metadata (OSSEM)☆1,288Feb 27, 2023Updated 3 years ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,142Dec 19, 2025Updated 2 months ago
- Graph-based security analysis for everyone☆357Feb 19, 2026Updated 2 weeks ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆289Feb 5, 2024Updated 2 years ago
- A repository of curated datasets from various attacks☆729Updated this week
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆532Feb 15, 2026Updated 2 weeks ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,452Updated this week
- Collaborative Incident Response platform☆1,429Feb 16, 2026Updated 2 weeks ago
- ☆2,513Updated this week
- Splunk Security Content☆1,576Feb 26, 2026Updated last week
- Graph platform for Detection and Response☆699Dec 26, 2022Updated 3 years ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆386Apr 3, 2024Updated last year
- GUAC aggregates software security metadata into a high fidelity graph database.☆1,450Updated this week
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,208Updated this week
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆719Nov 14, 2025Updated 3 months ago
- ☆35Feb 27, 2025Updated last year
- Production-ready detection & response queries for osquery☆600Aug 13, 2025Updated 6 months ago
- OCSF Schema Validation☆13Dec 13, 2024Updated last year
- Anvilogic Forge☆115Sep 18, 2025Updated 5 months ago
- Microsoft Threat Intelligence Security Tools☆1,948Feb 10, 2026Updated 3 weeks ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,492Jan 12, 2026Updated last month
- A framework for developing alerting and detection strategies for incident response.☆841Sep 8, 2025Updated 5 months ago
- Cyber Analytics Repository☆986May 16, 2025Updated 9 months ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,549Feb 10, 2026Updated 3 weeks ago
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,891Jul 25, 2025Updated 7 months ago
- The open source AI platform for secure enterprise agents.☆3,518Updated this week
- Sublime rules for email attack detection, prevention, and threat hunting.☆348Updated this week
- A knowledge base of actionable Incident Response techniques☆662May 31, 2022Updated 3 years ago