martinsohn / CIS-Controls
☆15Updated 2 years ago
Alternatives and similar repositories for CIS-Controls:
Users that are interested in CIS-Controls are comparing it to the libraries listed below
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated 3 weeks ago
- Incident Response Playbooks☆14Updated 5 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated 11 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆17Updated 2 months ago
- ☆47Updated this week
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- A script to create and assign SOP tasks into the cases☆19Updated 4 years ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆19Updated 2 weeks ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- My Jupyter Notebooks☆36Updated last month
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 3 years ago
- ☆29Updated 4 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆19Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated last month
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated last year
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- CSIRT Jump Bag☆26Updated 11 months ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆23Updated last week
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆31Updated last year
- MITRE ATT&CK Based App in Power BI☆13Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 4 months ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆21Updated 7 months ago
- Azure AD Incident Response☆25Updated 3 years ago
- ☆23Updated 7 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆55Updated 3 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated 3 weeks ago
- Elastic version of SOC prime watcher rules☆29Updated 6 months ago
- Cybersecurity Incident Response Plan☆90Updated 4 years ago
- ☆41Updated last year