SecurityBagel / MITRE_ATTACK_PowerBI_Links
MITRE ATT&CK Based App in Power BI
☆18Updated last year
Alternatives and similar repositories for MITRE_ATTACK_PowerBI_
Users that are interested in MITRE_ATTACK_PowerBI_ are comparing it to the libraries listed below
Sorting:
- A Secure Controls Framework (SCF) Power BI App☆26Updated last year
- NIST 800-53 Baseline Configuration Tool☆14Updated last year
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated last year
- Generate a matrix based on an inventory of InfoSec tools☆23Updated last year
- NIST CSF Maturity Toolkit☆114Updated 8 months ago
- ☆47Updated 3 years ago
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆104Updated last year
- MISP to Sentinel integration☆79Updated 2 months ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆55Updated 2 years ago
- ☆45Updated last year
- Cybersecurity Incident Response Plan☆109Updated 5 years ago
- A tool that allows you to document and assess any security automation in your SOC☆49Updated last year
- ☆96Updated last month
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆51Updated 2 months ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Updated 4 years ago
- NIST CyberSecurity Framework management tool☆166Updated 4 years ago
- A collection of ARM-based detections for Azure/AzureAD based TTPs☆89Updated 2 years ago
- ☆99Updated 3 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Updated 5 years ago
- Automating Security Detection Engineering, published by Packt☆67Updated last year
- Practical Threat Detection Engineering, Published by Packt☆84Updated 2 years ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆156Updated 2 months ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆27Updated 2 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆86Updated last month
- ☆88Updated 11 months ago
- A list of Splunk queries that I've collected and used over time.☆91Updated 5 years ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆225Updated last year
- Conference presentations☆60Updated 3 months ago
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆68Updated 2 months ago