CISecurity / CCPA-DocsLinks
☆10Updated 2 years ago
Alternatives and similar repositories for CCPA-Docs
Users that are interested in CCPA-Docs are comparing it to the libraries listed below
Sorting:
- The Infosec Community Definitive Guide to Jupyter Notebooks☆130Updated 5 years ago
- OSSEM Common Data Model☆56Updated 3 years ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated this week
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Controls Assessment Specification☆70Updated 8 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆59Updated 3 years ago
- ☆94Updated this week
- A curated list of awesome things related to TheHive & Cortex☆182Updated 4 years ago
- OWASP Foundation Web Respository☆31Updated 2 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Updated 2 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆33Updated 9 years ago
- A collection of awesome security controls mapping for solutions across frameworks.☆57Updated 5 years ago
- Workflows for Shuffle☆24Updated 3 years ago
- an awesome list of active defense resources☆127Updated 5 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆127Updated 8 months ago
- ☆55Updated 4 years ago
- ☆49Updated 2 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Updated last year
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆51Updated 4 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆51Updated this week
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆75Updated 5 years ago
- ☆120Updated last month
- Notes on managing and coordinating the response to major cyber incidents☆41Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- Cybersecurity Incident Response Plan☆109Updated 5 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆119Updated 6 months ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆55Updated 3 years ago
- A python package for use in generating fake data for SOC and security automation.☆172Updated 9 months ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆34Updated 2 months ago