SecurityBagel / SCFBagel
A Secure Controls Framework (SCF) Power BI App
☆12Updated 3 weeks ago
Related projects: ⓘ
- MITRE ATT&CK Based App in Power BI☆11Updated 6 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆12Updated 3 weeks ago
- Collection of Microsoft Identity Threat Detection and Response resources.☆31Updated 2 weeks ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆50Updated last year
- A collection of ARM-based detections for Azure/AzureAD based TTPs☆78Updated 9 months ago
- Generate a matrix based on an inventory of InfoSec tools☆22Updated 2 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆51Updated last year
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆27Updated 11 months ago
- Discover for Cloud and Containers Azure☆27Updated 2 months ago
- Solution to deploy a Sentinel playground demo environment☆53Updated last year
- Web based S1 query navigator for one-click threat hunting☆18Updated 3 years ago
- The idea is simply to save some quick notes that will make it easier for Splunk users to leverage KQL (Kusto), especially giving projects…☆35Updated 3 years ago
- Security Scripts and Sources for daily usage.☆44Updated last week
- ☆51Updated 2 months ago
- ☆29Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆40Updated 4 months ago
- Collection of scripts to extract Azure resource information to support security compliance audit.☆23Updated 2 years ago
- Programming Microsoft Sentinel book☆22Updated 9 months ago
- Misc. content for Microsoft Sentinel☆16Updated 5 months ago
- ☆40Updated 5 months ago
- ☆68Updated last year
- ThreatModel for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based app…☆57Updated last year
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆28Updated 2 years ago
- A collection of various SIEM rules relating to malware family groups.☆60Updated 3 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆36Updated last month
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆54Updated this week
- Cloud threat detection visualization from excalidraw☆12Updated 2 years ago
- ☆29Updated last year
- ☆18Updated 2 months ago
- ☆44Updated this week