PaloAltoNetworks / cis-benchmarks
CIS benchmark quickplay for rapid assessments of the NGFW
☆13Updated last year
Alternatives and similar repositories for cis-benchmarks
Users that are interested in cis-benchmarks are comparing it to the libraries listed below
Sorting:
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 6 months ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 2 months ago
- Official Palo Alto Networks MineMeld docker☆17Updated 5 years ago
- Workflows for Shuffle☆22Updated 2 years ago
- ☆16Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Collection of Dashboards for Threat Hunting and more!☆68Updated 4 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆37Updated 4 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- Ansible playbook for installing MineMeld on Linux☆48Updated 4 years ago
- ☆17Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- A collection of tips for using MISP.☆74Updated 5 months ago
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 9 months ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Documentation used for Shuffle☆19Updated last week
- Incident Response Playbooks☆14Updated 5 years ago
- Palo Alto Networks Rule Parser☆16Updated 8 years ago
- ☆54Updated 3 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated last month
- ☆19Updated 3 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆56Updated 3 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆52Updated 2 years ago
- MineMeld nodes for MISP☆19Updated last year
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆20Updated 3 weeks ago
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11Updated last year
- ☆13Updated 4 months ago