The Microsoft Cybersecurity Reference Architecture (https://aka.ms/MCRA) describes Microsoft’s cybersecurity capabilities and how they integrate with existing security architectures and capabilities.
☆21Jun 5, 2018Updated 7 years ago
Alternatives and similar repositories for MCRA
Users that are interested in MCRA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Microsoft Security Guidance☆251May 16, 2024Updated last year
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- ☆14May 30, 2018Updated 7 years ago
- ☆49Feb 15, 2026Updated 2 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Exports MISP events to STIX and ingest into McAfee ESM☆15Feb 12, 2020Updated 6 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Jan 31, 2023Updated 3 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- ☆22Jul 27, 2020Updated 5 years ago
- CTF designed for Middle School-aged kids☆12Oct 18, 2024Updated last year
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Aug 16, 2023Updated 2 years ago
- ☆16Dec 3, 2020Updated 5 years ago
- A chrome extension for automatically save the visited pages and the downloaded URLs in your bookmarks.☆16May 11, 2016Updated 9 years ago
- Public API client for GETTR, a "non-bias [sic] social network," designed for data archival and analysis.☆13Jun 21, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The All In One Script!☆10Feb 12, 2020Updated 6 years ago
- ☆10Apr 2, 2022Updated 4 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Jun 25, 2025Updated 9 months ago
- LLM-Powered Code Security Scanning☆21Apr 2, 2025Updated last year
- ☆16Jan 23, 2022Updated 4 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- LaTeX Report Template for Offensive Security's OSCP Exam.☆14Mar 13, 2022Updated 4 years ago
- Sentinel Recon Tools Workbook☆14Aug 24, 2022Updated 3 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 7 years ago
- ☆14Jul 26, 2024Updated last year
- ☆14Nov 12, 2021Updated 4 years ago
- Parses the FireEye HX .mans triage collections and sends them to ElasticSearch☆17Feb 17, 2023Updated 3 years ago
- GitHub repository for the API Security for White Hat Hackers book☆15May 31, 2024Updated last year
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆24Jan 24, 2025Updated last year
- Home Assistant Configuration☆10May 13, 2020Updated 5 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 3 years ago
- API Testing and Development with Postman, Second Edition☆17Jun 18, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- PoC exploit code for CVE-2021-26855☆17Mar 9, 2021Updated 5 years ago
- This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffi…☆31Oct 18, 2021Updated 4 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 11 months ago
- A detailed repository of vulnerabilities that I discovered in The Squid Caching Proxy.☆23Mar 25, 2026Updated 3 weeks ago
- Coordinates scrapers and interfaces with database☆20Aug 8, 2023Updated 2 years ago
- Automation Task Templates☆11May 20, 2025Updated 10 months ago