enisaeu / CNWLinks
Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States’ appointed CSIRTs and CERT-EU.
☆83Updated 3 months ago
Alternatives and similar repositories for CNW
Users that are interested in CNW are comparing it to the libraries listed below
Sorting:
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆91Updated last year
- CISA CSAF Security Advisories☆74Updated last week
- List of past and future infosec related events.☆157Updated this week
- ☆119Updated last year
- MISP Playbooks☆206Updated last month
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆112Updated 7 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆207Updated last week
- Stakeholder-Specific Vulnerability Categorization☆153Updated last week
- ☆92Updated last month
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆114Updated last week
- Collection of Jupyter Notebooks by @fr0gger_☆172Updated last month
- A collection of tips for using MISP.☆74Updated 7 months ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆334Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- Repository of public reference frameworks for the DFIR community.☆116Updated 2 years ago
- Memory Forensic System on Cloud☆90Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 8 months ago
- Intelligence Architecture Mind Map☆132Updated last year
- An open source platform to support analysts to organise their case and tasks☆87Updated last week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated 11 months ago
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆76Updated 2 weeks ago
- Cyber Underground General Intelligence Requirements☆94Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆67Updated this week
- Anvilogic Forge☆104Updated last week
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆119Updated last month
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- OWASP Foundation Web Respository☆31Updated 2 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆164Updated last year