SentiConSecurity / NIST_CSF_Maturity_Tool
NIST CSF Maturity Toolkit
☆19Updated 3 weeks ago
Related projects: ⓘ
- A tool that allows you to document and assess any security automation in your SOC☆40Updated 4 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆189Updated 10 months ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆67Updated 3 weeks ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆65Updated 3 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆93Updated 6 months ago
- Automating Security Detection Engineering, published by Packt☆42Updated 3 months ago
- ☆40Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆37Updated 4 months ago
- Cybersecurity Incident Response Plan☆86Updated 3 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆68Updated 9 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆113Updated 9 months ago
- ☆113Updated 11 months ago
- ☆83Updated 2 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆108Updated 3 years ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆135Updated 2 weeks ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆47Updated last week
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆49Updated 2 years ago
- Tools for simulating threats☆170Updated 10 months ago
- ☆62Updated this week
- Dettectinator - The Python library to your DeTT&CT YAML files.☆102Updated 3 weeks ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆64Updated 6 months ago
- ☆79Updated last month
- Resources for SANS CTI Summit 2021 presentation☆102Updated 10 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆139Updated 2 weeks ago
- A Command-line tool which leverages the Tenable.io API to reduce the time it takes to get information that is common during remediation o…☆72Updated last week
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆58Updated 4 years ago
- Resources To Learn And Understand SIGMA Rules☆163Updated last year
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆105Updated last year
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆120Updated 6 months ago
- Convert Sigma rules to LogRhythm searches☆19Updated 2 years ago