opencybersecurityalliance / cacao-roasterView external linksLinks
A web application for generating, parsing and validating, manipulating, visualizing and executing CACAO v2.0 playbooks.
☆39Aug 27, 2025Updated 5 months ago
Alternatives and similar repositories for cacao-roaster
Users that are interested in cacao-roaster are comparing it to the libraries listed below
Sorting:
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆101Updated this week
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- ☆19Jul 28, 2025Updated 6 months ago
- MISP to Microsoft Defender integration☆16Feb 6, 2026Updated last week
- OCA-wide documentation shared by all sub-projects and repositories☆33Oct 31, 2024Updated last year
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Aug 24, 2022Updated 3 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Apr 9, 2025Updated 10 months ago
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆31Jan 16, 2024Updated 2 years ago
- the IoT and OT (Operational Technology) Honeypot☆30Mar 16, 2024Updated last year
- Passive DNS Common Output Format☆37Aug 30, 2024Updated last year
- Python client for DFIR-IRIS☆25Aug 19, 2024Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Oct 21, 2025Updated 3 months ago
- ☆30Mar 3, 2021Updated 4 years ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆90Mar 2, 2021Updated 4 years ago
- AIL project training materials☆39Jul 17, 2025Updated 6 months ago
- ☆14Nov 11, 2014Updated 11 years ago
- Threat Intel Platform for T-POTs☆167Updated this week
- CameraCipher Library (an IOCipher project)☆11Jul 14, 2015Updated 10 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆98Jun 4, 2025Updated 8 months ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆467Updated this week
- Sharpen your data science and cybersecurity skills by doing a project with open datasets☆10Jun 9, 2020Updated 5 years ago
- Python framework for collecting and analyzing TLS certificate data via the Certificate Transparency Network☆12May 25, 2025Updated 8 months ago
- OCSF Schema Validation☆12Dec 13, 2024Updated last year
- 9P file server for Upspin☆11Feb 20, 2023Updated 2 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆10Aug 9, 2020Updated 5 years ago
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆13Mar 27, 2024Updated last year
- Upstream for Non Interactive Zero Knowledge CTF platform☆10May 21, 2020Updated 5 years ago
- High fidelity JA3 & JA3S combinations for known botnets and alike☆11Feb 14, 2019Updated 6 years ago
- ☆10Sep 12, 2024Updated last year
- Source Code for 'Cryptography and Cryptanalysis in MATLAB' by Marius Iulian Mihailescu and Stefania Loredana Nita☆13Sep 14, 2021Updated 4 years ago
- Scraping darknet forums has been the object of research in the field of intelligence and security informatics. In this repository we scr…☆11May 18, 2023Updated 2 years ago
- Display latest Cyber Security News within your PiMirror☆10Feb 23, 2021Updated 4 years ago
- One-click bookmarklet que acha AWS, Azure, Stripe, Firebase, JWT e chaves de alta entropia em qualquer app em 10 segundos☆39Dec 19, 2025Updated last month
- bad stuffs by bad guys☆49Jul 28, 2022Updated 3 years ago
- Dark web related material☆23May 19, 2025Updated 8 months ago
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.☆12Jan 13, 2025Updated last year
- ☆10Feb 26, 2023Updated 2 years ago