opencybersecurityalliance / oasis-open-projectLinks
Information relating to the governance of the Open Cybersecurity Alliance (OCA) OASIS Open Project. https://github.com/opencybersecurityalliance
☆26Updated last month
Alternatives and similar repositories for oasis-open-project
Users that are interested in oasis-open-project are comparing it to the libraries listed below
Sorting:
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated 7 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆55Updated last week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆47Updated this week
- Exploit Prediction Scoring System (EPSS)☆27Updated 3 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆122Updated 4 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆52Updated 3 months ago
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆28Updated last year
- ☆64Updated 4 months ago
- OASIS OpenC2 TC: Repository for submitting and reviewing OpenC2 use cases relevant to the work of the OpenC2 Language Subcommittee (LSC)☆28Updated 3 years ago
- Python samples and utilities for Chronicle APIs☆83Updated 3 weeks ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆50Updated last year
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆71Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated last week
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- OSSEM Common Data Model☆55Updated 2 years ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 7 months ago
- Kestrel Jupyter Notebook Kernel☆9Updated last year
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- Notes on managing and coordinating the response to major cyber incidents☆40Updated 5 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- Documentation for Zeek☆50Updated 2 weeks ago
- Pre-configured environment that supports the development and running of OpenDXL solutions☆13Updated 4 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆41Updated 2 months ago
- Best practices in threat intelligence☆47Updated 2 years ago
- OASIS TC Open Repository: The repository cti-stix-slider supports development of a Python application to convert STIX 2.0 content to STIX…☆21Updated last year
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆82Updated last year