Downloads Catalog

Every artifact aligned to SOaC\'s five pillars. GitHub is the source of truth — direct downloads are provided where files are available locally.

Pillar:
Audience:

🚀 Start Here

SOaC Enterprise White Paper v2.0

v2.0 | March 2026

Executive overview of the Distributed Intelligence Architecture — board-ready presentation of vision, ROI, and adoption roadmap.

🚀 start hereCISO/Board

CISO Transformation Guide v2.0 (PDF)

v2.0 | March 2026

From reactive risk to programmable resilience — strategic framework for CISOs evaluating SOaC adoption across all four operational roles.

🚀 start hereCISO/Board

What's New in v2.0-PLATINUM

v2.0 | March 2026

Comprehensive release brief — Four-Role Model, Evidence Engine, Team Games, all verified MTIP packages.

🚀 start hereAll

Executive Architecture Brief v2.0

v2.0 | March 2026

Two-page strategic snapshot of the Distributed Intelligence Architecture — four pillars, role-to-pillar mapping, deployment topology.

🚀 start hereCISO/Board

Architecture Reference v2.0 (PDF)

v2.0 | March 2026

Technical blueprint covering all four pillars, data flow, role-to-pillar mapping, and Play → Verify → Integrate deployment topology.

🚀 start hereEngineersPlatform/Cloud

Validation & Evidence Model v2.0 (PDF)

v2.0 | March 2026

Three-level validation framework — Schema (L1), Cross-Reference (L2), Replay & Evidence (L3) with Evidence Bundles.

🚀 start hereEngineersSOC/IR

How It Works — Technical Overview v2.0 (PDF)

v2.0 | March 2026

End-to-end walkthrough of the SOaC data path with deployment models and integration patterns.

🚀 start hereEngineersPlatform/Cloud

SOC / IR Deployment Runbook v2.0 (PDF)

v2.0 | March 2026

Operational playbook for SOC analysts and incident responders — lab setup, scenario execution, CLAW deployment, and role-based workflows.

🚀 start hereSOC/IR

Team Game Operations Guide v2.0 (PDF)

v2.0 | March 2026

Multi-role team simulations — role selection, walkthroughs, scoring, and After Action Review (AAR) templates.

🚀 start hereSOC/IROperators

Platform Operating Model v2.0 (PDF)

v2.0 | March 2026

Governance, ownership, change management, and steady-state operations — RACI matrices, KPIs, and escalation paths.

🚀 start hereCISO/BoardOperators

CLAW Playbook Schema v1.0 Spec (PDF)

Formal specification of the CLAW YAML schema — the contract between human operators and automated response.

🚀 start hereSOC/IREngineers

Quick Start Validation Script

Python script to validate your SOaC deployment end-to-end in under 5 minutes.

🚀 start hereOperators

Compliance Matrix

Maps SOaC controls to NIST, MITRE, ISO 27001, and SOC2 requirements.

🚀 start hereCISO/Board

CLAW Playbook Template v1.0

Canonical YAML schema for all CLAW automated response playbooks. Every playbook in every package MUST conform to this template.

🚀 start hereSOC/IREngineers

Detection Rule Template v1.0

Canonical YAML schema for all detection rules. Multi-platform support (Splunk, Sentinel, CrowdStrike, Sigma).

🚀 start hereEngineersSOC/IR

Policy-as-Code Template v1.0

Canonical YAML schema for policy definitions. Covers environment constraints, action controls, and compliance mapping.

🚀 start hereCISO/BoardEngineers

Package Metadata Template v1.0

Required metadata.yml manifest for every SOaC package. Declares identity, threat coverage, artifacts, and validation status.

🚀 start hereEngineersOperators

SOaC Harness — CLI Validation Engine

v2.0.0

Offline, CI-ready CLI that validates Playbooks, Detections, Policies, and Package Metadata at Level 1 (Schema) and Level 2 (Cross-Reference).

🚀 start hereEngineersOperators

GitHub Actions CI Pipeline

Ready-made soac-ci.yml workflow that runs Level 1 + Level 2 harness validation on every push and PR to main.

🚀 start hereEngineersOperators

🛡️ The Body — Telemetry & Detections

Sample Identity Theft Alert (JSON)

Example AitM phishing alert payload showing the telemetry structure SOaC consumes.

🛡️ the bodySOC/IR

Vendor Packs (Sigma/KQL/SPL/LQL)

Detection rules in all major SIEM query languages, ready to deploy.

🛡️ the bodyDetection Eng

All 11 Package Folders

Browse the full set of detection + response packages on GitHub.

🛡️ the bodyAll

🧠 The Brain — Reasoning & Governance

AI Governance Baseline (YAML)

Prompt injection defense, data-leakage prevention, and decision authority matrix for Claude Security AI.

🧠 the brainPlatform/Cloud

Compliance Matrix

Maps SOaC controls to NIST, MITRE, ISO 27001, and SOC2 requirements.

🧠 the brainCISO/Board

⚡ The Purpose — CLAW Playbooks-as-Code

CLAW Schema v1.0 Spec (PDF)

Full specification defining the YAML contract for automated response playbooks.

the purposeEngineers

CLAW Schema (Markdown)

Human-readable schema reference for CLAW playbooks.

the purposeEngineers

Master Orchestrator (Python)

The central orchestration engine that executes CLAW playbooks.

the purposePlatform/Cloud

Requirements

Python dependencies for running the orchestrator and validation scripts.

the purposeOperators

🌐 The Edge — Enforcement & Policy-as-Code

Edge API Spec

HMAC-signed enforcement API for distributed policy enforcement at the network edge.

🌐 the edgePlatform/Cloud

Lab Safety Policy (YAML)

Policy-as-code controlling lab vs. staging vs. production behavior boundaries.

🌐 the edgeSOC/IR

📋 Releases & Changelog

v2.0-M5 — Public Evidence Surfaces

Interactive evidence viewer for all MTIP packages: MITRE coverage tables, replay timelines, pillar charts, and raw artifact downloads — all publicly accessible.

📋 releasesAll

v2.0-M4 — Replay & Evidence

Level 3 Replay Engine: scenario-driven evidence generation with MITRE ATT&CK coverage metrics. Each MTIP package now ships with a machine-readable Evidence Bundle proving artifact reachability.

📋 releasesAll

v2.0-M3 — Package Manager & Lab

MTIP Package Manager with 11 downloadable packages, interactive Scenario Lab with per-package walkthroughs, and CI-integrated Level 1 + 2 validation.

📋 releasesAll

Release 1.0 Roadmap

Milestone plan and delivery timeline for the SOaC 1.0 release.

📋 releasesAll

Contributing Guide

How to contribute detection rules, playbooks, and documentation to SOaC.

📋 releasesAll

Code of Conduct

Community standards for respectful, inclusive collaboration.

📋 releasesAll

📦 Packages — All 11 Bundles

PKG-001

0APT Identity Pivot

Detect and contain AitM phishing, session hijacking, and identity-based attacks across Okta, Entra ID, and Azure AD. Simulates 0APT threat actor TTPs.

CISO/BoardDetection EngSOC/IRT1557.001T1078.004T1539
PKG-002

Qilin Ransomware Containment

Full ransomware containment exercise: Qilin RaaS deployment, VSS deletion, encryption chain, host isolation, forensic evidence collection.

CISO/BoardDetection EngSOC/IRT1486T1059T1068T1490
PKG-003

Cloud Control Plane Hijack

Simulate AWS IAM privilege escalation, cross-account pivoting, and cloud control plane compromise. Pattern-based cloud attack scenarios.

CISO/BoardDetection EngSOC/IRPlatform/CloudT1078.004T1548T1484
PKG-004

SaaS Pivot & Data Extortion

SaaS OAuth abuse, token theft, and data extortion simulation. Covers OAuth consent phishing, application impersonation, and data exfiltration via SaaS APIs.

CISO/BoardDetection EngSOC/IRT1528T1550.001T1567
PKG-005

Social Engineering + RMM Abuse

Callback phishing, vishing, and remote monitoring/management (RMM) tool abuse. Simulates social engineering to deploy unauthorized RMM persistence.

CISO/BoardDetection EngSOC/IRT1566.003T1219T1204.001
PKG-006

EvilProxy Credential Harvest

AiTM phishing kit simulation using EvilProxy toolkit. Covers reverse-proxy credential theft, session token replay, and post-compromise detection.

CISO/BoardDetection EngSOC/IRT1598T1566.002T1056.004
PKG-007

Perimeter & Exploit Chaining Defense

External recon, vulnerability exploitation, webshell deployment, and privilege escalation. Full exploit chain from perimeter breach to lateral movement.

CISO/BoardDetection EngSOC/IRPlatform/CloudT1190T1505.003T1068T1021
PKG-008

Cloud Control Plane Defense

Blue team defense against cloud control plane attacks. AWS + Azure IAM hardening, cross-account trust analysis, and privilege boundary enforcement.

CISO/BoardDetection EngSOC/IRPlatform/CloudT1078.004T1548T1484
PKG-009

SaaS OAuth Abuse & Extortion Defense

Defend against SaaS OAuth token abuse, consent phishing, and application-level data extortion. Detection and containment of malicious OAuth grants.

CISO/BoardDetection EngSOC/IRT1528T1550.001T1567
PKG-010

Callback Phishing & RMM Persistence Defense

Detect and contain callback phishing campaigns and unauthorized RMM tool persistence. Covers vishing response, RMM detection, and social engineering defense.

CISO/BoardDetection EngSOC/IRT1566.003T1219T1204.001
PKG-011

GenAI & LLM Abuse Defense

Defend against generative AI and LLM abuse: prompt injection, model manipulation, data leakage via AI tools, and shadow AI detection.

CISO/BoardDetection EngSOC/IRPlatform/CloudT1059T1530T1213
PKG-012

LiteLLM Supply Chain Attack Defense

Elite-tier supply chain attack simulation. A trojanized Python package deploys a .pth persistence hook that harvests cloud credentials, SSH keys, and Kubernetes tokens. Full red/blue/SOC/CISO response chain.

CISO/BoardDetection EngSOC/IRPlatform/CloudT1195.002T1552.001T1528T1078.004
PKG-013

CI/CD Supply Chain Defense

Defense package targeting CI/CD pipeline supply chain attacks including dependency confusion, pipeline poisoning, artifact tampering, version tag mutation (Trivy-style), and secret exfiltration from b...

CISO/BoardDetection EngSOC/IRPlatform/CloudT1195.002T1059.004T1552.001T1496T1588.001
PKG-014

Axios Supply Chain Compromise Defense

A sophisticated supply chain attack targeting the popular Axios JavaScript library through compromised npm maintainer accounts, resulting in malicious versions that deploy cross-platform RAT malware. ...

CISO/BoardDetection EngSOC/IRPlatform/CloudT1195.002T1204.005T1027T1071.001T1105
PKG-015

APT37 (Famous Chollima) - Operation HanKook Phantom Defense

APT37 (Famous Chollima) is a North Korean state-sponsored threat actor conducting sophisticated cyber espionage campaigns since 2012. In 2025, they launched Operation HanKook Phantom, targeting South

CISO/BoardDetection EngSOC/IRPlatform/CloudT1566.001T1566.002T1059.001T1567.002T1573.001
PKG-016

UAT-8837: AD Recon, Identity Pivot & Reverse Tunnel Defense

UAT-8837, a China-nexus APT group, targets critical infrastructure sectors in North America using zero-day and n-day vulnerabilities for initial access. The group deploys various open-source tools inc

CISO/BoardDetection EngSOC/IRPlatform/CloudT1190T1078T1082T1033T1049
PKG-017

Exploit Chain Disruption: Web Exploit → Sandbox Escape → AWS Metadata (Mythos Pattern)

Instance-level exploit chain package: Web application exploitation (T1190) chains to process injection sandbox escape (T1055), pivoting to AWS metadata credential theft (T1552.005). Implements the Mythos autonomous chain pattern with 2 defensive breakpoints and cross-domain correlation.

CISO/BoardDetection EngSOC/IRPlatform/CloudT1190T1055T1552.005
PKG-018

AI Agent Governance: Prompt Injection & Multi-Domain Lateral Pivot Disruption

AI coding agent governance package for AI Coding Agent (Claude Code / Cursor): interactive mode, critical risk

CISO/BoardDetection EngSOC/IRPlatform/CloudT1059T1059.004T1083T1565T1528
PKG-019

Storm-1175 High-Velocity Medusa Ransomware Campaign Defense

N-Day defense package for CVE-2025-31324 (SAP NetWeaver — primary anchor): Microsoft Exchange, Papercut, Ivanti Connect Secure, Ivanti Policy Secure, ConnectWise ScreenConnect, JetBrains TeamCity, Sim

CISO/BoardDetection EngSOC/IRPlatform/CloudT1190T1059T1053T1003T1552