cisagov / csetLinks
Cybersecurity Evaluation Tool
☆1,754Updated last week
Alternatives and similar repositories for cset
Users that are interested in cset are comparing it to the libraries listed below
Sorting:
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,529Updated last year
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,206Updated last week
- Detect Tactics, Techniques & Combat Threats☆2,260Updated last week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,325Updated last week
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,306Updated this week
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆927Updated last year
- Splunk Security Content☆1,561Updated this week
- Re-play Security Events☆1,716Updated last year
- ☆2,380Updated 2 years ago
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆2,018Updated last month
- A concise, directive, specific, flexible, and free incident response plan template☆750Updated last year
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,076Updated last year
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,421Updated last week
- Cyber Analytics Repository☆976Updated 8 months ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,432Updated 3 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,514Updated 2 weeks ago
- Incident Response Methodologies 2022☆1,100Updated 9 months ago
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,453Updated last year
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,059Updated 8 months ago
- MITRE ATT&CK Website☆563Updated 2 weeks ago
- Actionable analytics designed to combat threats☆1,005Updated 3 years ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,302Updated 2 years ago
- SIEM Tactics, Techiques, and Procedures☆691Updated 3 weeks ago
- Scripts and a (future) library to improve users' interactions with the ATT&CK content☆591Updated 2 years ago
- Microsoft Threat Intelligence Security Tools☆1,933Updated last week
- An informational repo about hunting for adversaries in your IT environment.☆1,843Updated 4 years ago
- Windows Events Attack Samples☆2,496Updated 3 years ago
- Open Source Security Events Metadata (OSSEM)☆1,286Updated 2 years ago
- Sample queries for Advanced hunting in Microsoft 365 Defender☆2,048Updated 3 years ago
- A repository of sysmon configuration modules☆2,958Updated last year