GSA / threat-analysisLinks
☆16Updated 3 years ago
Alternatives and similar repositories for threat-analysis
Users that are interested in threat-analysis are comparing it to the libraries listed below
Sorting:
- ☆48Updated 2 years ago
- A simple open source command line tool to support common operations over OSCAL content.☆54Updated last month
- Documentation on the Cyber Defense Matrix☆25Updated 2 years ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆162Updated this week
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆46Updated 3 years ago
- Stakeholder-Specific Vulnerability Categorization☆163Updated this week
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated 7 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆73Updated this week
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆44Updated 5 years ago
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆40Updated last month
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆44Updated last month
- VulnCheck's official command line tool☆139Updated 2 weeks ago
- Controls Assessment Specification☆70Updated 5 months ago
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- Tools for the OSCAL project☆36Updated 2 years ago
- Security Control Knowledge Graph☆29Updated last year
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆24Updated 11 months ago
- A collection of awesome security controls mapping for solutions across frameworks.☆56Updated 5 years ago
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆75Updated 5 months ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆58Updated 3 years ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆51Updated last year
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- OWASP Foundation Web Respository☆31Updated 2 years ago
- Various deployments of the OSCAL editor☆46Updated last year
- An ACAS/SCAP/CKL scan parser and report generator☆25Updated 4 years ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 10 months ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆55Updated 5 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week