martinsohn / CIS-ControlsLinks
☆16Updated 2 years ago
Alternatives and similar repositories for CIS-Controls
Users that are interested in CIS-Controls are comparing it to the libraries listed below
Sorting:
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated last week
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- ☆47Updated last month
- Repo for experimenting and testing MCP server builds for CTI-related research.☆26Updated 3 weeks ago
- Repository for SPEED SIEM Use Case Framework☆55Updated 5 years ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆20Updated last week
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆22Updated 4 months ago
- ☆41Updated 3 months ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆26Updated 7 months ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Updated 3 years ago
- My Jupyter Notebooks☆36Updated 2 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 3 months ago
- Incident Response Playbooks☆14Updated 5 years ago
- ☆18Updated 3 years ago
- OWASP Foundation Web Respository☆31Updated 2 years ago
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 7 months ago
- A Secure Controls Framework (SCF) Power BI App☆21Updated 7 months ago
- ☆13Updated 5 months ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- Workflows for Shuffle☆23Updated 2 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆57Updated 3 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆38Updated 3 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆20Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆29Updated last month
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆91Updated 7 months ago