cisagov / XFDLinks
CyHy Dashboard
☆25Updated this week
Alternatives and similar repositories for XFD
Users that are interested in XFD are comparing it to the libraries listed below
Sorting:
- Search a filesystem for indicators of compromise (IoC).☆83Updated last month
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆156Updated 2 months ago
- ☆49Updated 2 years ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆118Updated this week
- Elevate your Security Operations Center's efficiency with Howler, the cutting-edge alert triage platform tailored for today's SOC demands…☆43Updated this week
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆35Updated last year
- WA Cyber Security Unit (DGOV Technical) site☆44Updated this week
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆171Updated last week
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆79Updated this week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆53Updated last week
- SCuBA Secure Configuration Baselines and assessment tool for Google Workspace☆290Updated this week
- Controls Assessment Specification☆70Updated 10 months ago
- ☆88Updated 11 months ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆54Updated 4 years ago
- A tool that allows you to document and assess any security automation in your SOC☆49Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆101Updated this week
- Import CrowdStrike Threat Intelligence into your instance of MISP☆50Updated 8 months ago
- Cybersecurity Incident Response Plan☆109Updated 5 years ago
- ☆56Updated 4 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆45Updated last year
- ☆20Updated 3 years ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆96Updated 2 months ago
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆18Updated 2 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Updated 5 years ago
- Collection of useful Canary tools☆93Updated last week
- OSSEM Common Data Model☆56Updated 3 years ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆90Updated 4 years ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆247Updated 2 weeks ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆32Updated last year
- ☆41Updated 2 years ago