GSA / threat-analysis
☆14Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for threat-analysis
- Automatically generated diagrams for OSCAL models☆16Updated 2 years ago
- Docker build of GovReady☆13Updated last year
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆12Updated 7 months ago
- ☆14Updated 3 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated last year
- Tools for the OSCAL project☆34Updated last year
- OSCAL reusable component definitions library☆10Updated 6 months ago
- ☆10Updated this week
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆43Updated 4 years ago
- Open Security Controls Assessment Language (OSCAL) Deep Differencing Tool☆29Updated last year
- ☆16Updated 3 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆35Updated last month
- XML metadata for NIST Technical Series Publications☆23Updated 2 weeks ago
- A simple open source command line tool to support common operations over OSCAL content.☆42Updated 5 months ago
- ☆18Updated 4 months ago
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆36Updated 3 months ago
- MITRE ATT&CK Based App in Power BI☆12Updated 8 months ago
- Various deployments of the OSCAL editor☆47Updated 3 months ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 2 years ago
- Continuous Audit Metrics☆24Updated 5 months ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆16Updated 3 weeks ago
- Scripts to import OSCAL example content into the Neo4J graph database☆27Updated last year
- A Secure Controls Framework (SCF) Power BI App☆16Updated 2 weeks ago
- Bugs Framework☆6Updated this week
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆13Updated last week
- A few quick recipes for those that do not have much time during the day☆21Updated 3 weeks ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆51Updated 2 weeks ago
- An ACAS/SCAP/CKL scan parser and report generator☆23Updated 3 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆27Updated last month
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆43Updated last month