opencybersecurityalliance / oasis-open-projectLinks
Information relating to the governance of the Open Cybersecurity Alliance (OCA) OASIS Open Project. https://github.com/opencybersecurityalliance
☆29Updated 2 months ago
Alternatives and similar repositories for oasis-open-project
Users that are interested in oasis-open-project are comparing it to the libraries listed below
Sorting:
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated last year
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated this week
- Actionable data for Security Operations☆19Updated 4 years ago
- misp-cloud - Cloud-ready images of MISP☆74Updated 3 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆130Updated 5 years ago
- OASIS TC Open Repository: Providing a collection of CTI-related training materials☆50Updated 3 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated 2 years ago
- Structured Threat Intelligence Graph☆98Updated 3 weeks ago
- ☆94Updated this week
- List of sigma for a variety of threats for multiple log sources.☆13Updated 7 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Updated 7 years ago
- Kestrel Jupyter Notebook Kernel☆10Updated 2 years ago
- Pre-configured environment that supports the development and running of OpenDXL solutions☆13Updated 4 years ago
- This repo represents work the Phantom Community collaborates on to build apps and learn.☆13Updated 4 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆53Updated this week
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆70Updated last year
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆60Updated 6 months ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Updated last year
- Controls Assessment Specification☆70Updated 9 months ago
- ☆78Updated this week
- ☆56Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- Continuous Threat Exposure Management Maturity Model (CTEMMM)☆26Updated last month
- ☆65Updated 3 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- ☆33Updated 3 years ago
- Community driven repository of Playbooks and Apps for ThreatConnect.☆74Updated 2 months ago
- Tool used to perform threat intelligence against packet data☆36Updated 11 months ago
- Firepit - STIX Columnar Storage☆17Updated last year