cisagov / ACID
☆63Updated last month
Related projects: ⓘ
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆71Updated this week
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆51Updated last week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆68Updated 9 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆113Updated 9 months ago
- ☆79Updated last month
- A collection of tips for using MISP.☆74Updated 5 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆124Updated this week
- An opensource sigma conversion tool built using pysigma☆90Updated 2 weeks ago
- A curated repository of incident response playbooks☆59Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆93Updated 6 months ago
- Industrial Control Systems Network Protocol Parsers☆155Updated last week
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆24Updated 2 weeks ago
- Repository of public reference frameworks for the DFIR community.☆105Updated last year
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆45Updated 3 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆189Updated 10 months ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆154Updated 10 months ago
- MISP Playbooks☆167Updated last month
- ☆43Updated 2 years ago
- ☆83Updated 2 years ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆86Updated 7 months ago
- Augmentation to Machine Readable CTI☆25Updated this week
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆15Updated 3 weeks ago
- ☆46Updated last week
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆55Updated 4 months ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆102Updated 3 weeks ago
- Cyber Underground General Intelligence Requirements☆85Updated 7 months ago
- ☆40Updated last year
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆73Updated 3 years ago
- Docker image for MISP☆109Updated last week
- User Feedback Space of #MitreAssistant☆37Updated last year