cisagov / XFDLinks
CyHy Dashboard
☆22Updated this week
Alternatives and similar repositories for XFD
Users that are interested in XFD are comparing it to the libraries listed below
Sorting:
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆144Updated this week
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆108Updated last month
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 3 months ago
- Search a filesystem for indicators of compromise (IoC).☆80Updated last month
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆163Updated this week
- AIL project training materials☆35Updated 2 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- ☆48Updated 2 years ago
- ☆87Updated 6 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆73Updated last week
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆75Updated 5 months ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 10 months ago
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated last year
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆90Updated last week
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated 7 months ago
- Home for TRANSITS materials☆25Updated last year
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Updated 4 years ago
- ☆55Updated 4 years ago
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆20Updated last year
- CrowdStrike's Open Source Policy & Contribution Guide☆44Updated 3 weeks ago
- SCuBA Secure Configuration Baselines and assessment tool for Google Workspace☆259Updated this week
- Workflows for Shuffle☆23Updated 2 years ago
- Conference presentations☆59Updated 2 weeks ago
- WA Cyber Security Unit (DGOV Technical) site☆42Updated this week
- ☆19Updated 2 years ago
- ☆119Updated last year
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆88Updated 4 years ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆47Updated 3 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 11 months ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated this week