GSA / threat-analysisLinks
☆16Updated 3 years ago
Alternatives and similar repositories for threat-analysis
Users that are interested in threat-analysis are comparing it to the libraries listed below
Sorting:
- ☆49Updated 2 years ago
- Stakeholder-Specific Vulnerability Categorization☆166Updated this week
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated this week
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated 9 months ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆25Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆47Updated last year
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆51Updated 4 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆81Updated 3 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆59Updated 3 years ago
- Short deep dive into Threat Hunting on AWS☆14Updated 2 years ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆29Updated 2 years ago
- A simple open source command line tool to support common operations over OSCAL content.☆55Updated 3 months ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated 5 months ago
- A collection of awesome security controls mapping for solutions across frameworks.☆57Updated 5 years ago
- pocket guide for core detection engineering concepts☆30Updated 2 years ago
- A web application to streamline the development of STIGs from SRGs☆82Updated last month
- ☆77Updated 3 years ago
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆45Updated 5 years ago
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆127Updated last year
- ☆31Updated 5 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- Security Alert Decoration☆27Updated 4 months ago
- VulnCheck's official command line tool☆140Updated 2 weeks ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆150Updated 2 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated last year
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago
- ☆120Updated last month
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- Tools for the OSCAL project☆36Updated 2 years ago