opencybersecurityalliance / documentationLinks
OCA-wide documentation shared by all sub-projects and repositories
☆33Updated 8 months ago
Alternatives and similar repositories for documentation
Users that are interested in documentation are comparing it to the libraries listed below
Sorting:
- Enables Zeek to communicate with Tenzir☆11Updated last year
- Information relating to the governance of the Open Cybersecurity Alliance (OCA) OASIS Open Project. https://github.com/opencybersecuritya…☆26Updated last week
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆53Updated 4 months ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆50Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆48Updated this week
- Firepit - STIX Columnar Storage☆16Updated last year
- Complementary material to presentations at events☆9Updated 2 years ago
- Zeek support for Community ID flow hashing.☆36Updated 2 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated 3 weeks ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- Kestrel Jupyter Notebook Kernel☆9Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆93Updated last month
- Specifications used in the MISP project including MISP core format☆51Updated last week
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- Zeek package for tracking long connections to report them before they have completed.☆30Updated last week
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 3 years ago
- Best practices in threat intelligence☆47Updated 2 years ago
- Integrate IBM QRadar and RPA to automate security L1 tasks.☆14Updated 3 years ago
- OASIS TC Open Repository: Providing a collection of CTI-related training materials☆50Updated 3 years ago
- Structured Threat Intelligence Graph☆95Updated 3 months ago
- OSSEM Common Data Model☆56Updated 2 years ago
- Falcon Integration Gateway (FIG)☆19Updated 2 months ago
- Global Security Database Tools☆43Updated last year
- Tools to assist in forensicating docker☆84Updated 4 months ago
- Python samples and utilities for Chronicle APIs☆84Updated 3 weeks ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- ☆19Updated 4 years ago