enisaeu / CNWLinks
Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States’ appointed CSIRTs and CERT-EU.
☆88Updated this week
Alternatives and similar repositories for CNW
Users that are interested in CNW are comparing it to the libraries listed below
Sorting:
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆97Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆112Updated 8 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated last year
- Collection of Jupyter Notebooks by @fr0gger_☆173Updated last month
- CISA CSAF Security Advisories☆81Updated this week
- MISP Playbooks☆206Updated last month
- ☆119Updated last year
- An open source platform to support analysts to organise their case and tasks☆96Updated this week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- Intelligence Architecture Mind Map☆134Updated last year
- Automating Security Detection Engineering, published by Packt☆60Updated 9 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆55Updated last week
- Stakeholder-Specific Vulnerability Categorization☆158Updated this week
- ☆94Updated 2 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆261Updated 4 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Updated last month
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆64Updated this week
- Practical Threat Detection Engineering, Published by Packt☆76Updated 2 years ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆187Updated 11 months ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆88Updated 4 years ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆103Updated last week
- A curated repository of incident response playbooks☆93Updated 2 years ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆348Updated last week
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆164Updated last year
- ☆105Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 9 months ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆143Updated last month
- ☆96Updated 2 years ago