opencybersecurityalliance / oca-iobView external linksLinks
Augmentation to Machine Readable CTI
☆37Sep 9, 2025Updated 5 months ago
Alternatives and similar repositories for oca-iob
Users that are interested in oca-iob are comparing it to the libraries listed below
Sorting:
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- ☆12Sep 8, 2025Updated 5 months ago
- Summarize CTI reports with OpenAI☆17Feb 2, 2026Updated last week
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆42Jan 20, 2026Updated 3 weeks ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Aug 24, 2022Updated 3 years ago
- ☆19Jul 28, 2025Updated 6 months ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- JSON schemas for validating CACAO Security Playbooks. Note: In December 2023, Cyentific AS offered and transferred the content of this re…☆19Dec 15, 2023Updated 2 years ago
- Cyber Threat Intelligence☆74Dec 7, 2025Updated 2 months ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆31Jan 16, 2024Updated 2 years ago
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated last week
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- ☆10Mar 31, 2021Updated 4 years ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆33Updated this week
- 🖼 imgify - Convert any file to PNG and back.☆13Oct 20, 2025Updated 3 months ago
- STIX 2 Fake Data Generator☆11Oct 17, 2024Updated last year
- Sandbox samples and monitor them with kunai☆29Jun 24, 2025Updated 7 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- An extension of the sigma standard to include security metrics.☆15May 18, 2023Updated 2 years ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆101Updated this week
- Rapports techniques de VIGINUM☆36Sep 15, 2025Updated 4 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Feb 4, 2026Updated last week
- ☆30Mar 3, 2021Updated 4 years ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆33Apr 2, 2024Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Oct 21, 2025Updated 3 months ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 3 years ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆98Jun 4, 2025Updated 8 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- AIL project training materials☆39Jul 17, 2025Updated 6 months ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, fo…☆13Aug 19, 2022Updated 3 years ago
- Tools used by CSIRT and especially in the scope of CNW☆17Jan 14, 2026Updated last month
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆324Sep 27, 2024Updated last year
- ☆102Dec 9, 2025Updated 2 months ago