jccyberx / CybetherLinks
Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard
☆81Updated 5 months ago
Alternatives and similar repositories for Cybether
Users that are interested in Cybether are comparing it to the libraries listed below
Sorting:
- NIST CSF Maturity Toolkit☆70Updated 2 months ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated last year
- A starter pack of resources to help you get started in Detection Engineering.☆170Updated last month
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆40Updated 5 months ago
- A 30-day hands-on SOC Analyst project simulating real-world cyber attacks using ELK Stack, Mythic C2, osTicket & Elastic Defend. Covers t…☆37Updated 2 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆196Updated last year
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆130Updated 3 weeks ago
- ☆113Updated 2 months ago
- ☆96Updated last month
- ☆35Updated 9 months ago
- ☆45Updated last year
- Open Source Security Operations Center Documentation☆192Updated last month
- Security Scripts and Sources for daily usage.☆65Updated 2 months ago
- Mapping of open-source detection rules and atomic tests.☆175Updated 7 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆56Updated last month
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆307Updated 3 weeks ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆113Updated last month
- Sentinel Logic Apps, Playbooks and Workbooks to automate enrichment, incident analysis and more.☆98Updated last month
- MISP Playbooks☆207Updated 2 months ago
- ☆184Updated last year
- A collection of various SIEM rules relating to malware family groups.☆69Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆261Updated 5 months ago
- MISP to Sentinel integration☆71Updated last week
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆122Updated 2 years ago
- Content Repo for Demystifying KQL Tutorial Series☆70Updated 11 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆409Updated 2 weeks ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆27Updated 9 months ago
- Cybersecurity Incident Response Plan☆97Updated 4 years ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆246Updated 3 weeks ago