CISecurity / CCPA-DocsLinks
☆10Updated last year
Alternatives and similar repositories for CCPA-Docs
Users that are interested in CCPA-Docs are comparing it to the libraries listed below
Sorting:
- Sharing Threat Hunting runbooks☆26Updated 5 years ago
- ☆11Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- ☆15Updated last year
- ☆11Updated 3 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 5 years ago
- Incident Response Playbooks☆14Updated 6 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Updated 2 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- ☆21Updated 2 years ago
- ☆16Updated 4 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Workflows for Shuffle☆23Updated 2 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 6 years ago
- Tool to check compliance with CIS Linux Benchmarks, specifically Distribution Independent, Debian 9 and Ubuntu 18.04 LTS, and generate sp…☆24Updated 4 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Incident Response Report Using GitHub-Sphinx☆20Updated 5 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated this week
- ☆15Updated 4 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated this week
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Updated 4 months ago
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated 9 months ago
- OSSEM Common Data Model☆55Updated 2 years ago
- Actionable data for Security Operations☆19Updated 3 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆41Updated 2 months ago
- SIEM Detection Use Case Library mapped to MITRE ATT&CK tactics and techniques☆12Updated 6 years ago
- NIST 800-53 Baseline Configuration Tool☆13Updated 10 months ago