SecurityBagel / MITRE_ATTACK_PowerBI_
MITRE ATT&CK Based App in Power BI
☆13Updated 10 months ago
Alternatives and similar repositories for MITRE_ATTACK_PowerBI_:
Users that are interested in MITRE_ATTACK_PowerBI_ are comparing it to the libraries listed below
- A Secure Controls Framework (SCF) Power BI App☆16Updated 2 months ago
- NIST 800-53 Baseline Configuration Tool☆9Updated 4 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆13Updated 2 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 8 months ago
- Web based S1 query navigator for one-click threat hunting☆18Updated 4 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆52Updated last year
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆18Updated last month
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆12Updated 9 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆104Updated last month
- A tool that allows you to document and assess any security automation in your SOC☆43Updated 2 months ago
- Incident Response Playbooks☆14Updated 5 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆67Updated 4 years ago
- Security Scripts and Sources for daily usage.☆51Updated this week
- ☆70Updated 2 months ago
- ☆42Updated 2 years ago
- Collection of Microsoft Identity Threat Detection and Response resources.☆36Updated 2 weeks ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆52Updated last year
- The idea is simply to save some quick notes that will make it easier for Splunk users to leverage KQL (Kusto), especially giving projects…☆39Updated 4 years ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated 6 months ago
- ☆45Updated last week
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆31Updated 2 months ago
- MISP to Sentinel integration☆62Updated last month
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆48Updated 2 years ago
- Convert Sigma rules to LogRhythm searches☆19Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆34Updated last month
- Notes on managing and coordinating the response to major cyber incidents☆39Updated 4 years ago
- A collection of various SIEM rules relating to malware family groups.☆64Updated 7 months ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆51Updated 2 years ago
- Azure function to insert MISP data in to Azure Sentinel☆31Updated 2 years ago