fractional-ciso / NIST-Cybersecurity-DocumentsLinks
Source for NIST cybersecurity documents during government shutdown
☆17Updated 6 years ago
Alternatives and similar repositories for NIST-Cybersecurity-Documents
Users that are interested in NIST-Cybersecurity-Documents are comparing it to the libraries listed below
Sorting:
- Azure Deployment Templates for Mandiant Managed Huning☆11Updated 2 years ago
- ☆16Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆15Updated 2 years ago
- ☆11Updated 4 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Updated 3 months ago
- A few quick recipes for those that do not have much time during the day☆22Updated 8 months ago
- Workflows for Shuffle☆23Updated 2 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Updated 5 months ago
- Sharing Threat Hunting runbooks☆26Updated 6 years ago
- ☆14Updated 4 years ago
- ☆29Updated this week
- Very basic CLI SIEM (Security Information and Event Management system).☆39Updated 7 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 4 years ago
- The Attacker IP Prioritizer(AIP) dynamically generates resource-friendly IPv4 blocklists from Zeek network flows.☆31Updated 8 months ago
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 11 months ago
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆10Updated last year
- AIL project training materials☆33Updated this week
- A curated threat modeling library collection☆22Updated last year
- Scripts to inject demo data and network traffic into an existing Alienvault/OSSIM installation☆21Updated 8 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated 2 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated 2 weeks ago
- ☆16Updated 4 years ago
- Detect leaks in security event logs.☆20Updated 6 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated 3 weeks ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- A curated list of awesome threat detection and hunting resources☆18Updated 6 years ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆13Updated last year
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Updated 3 years ago