mikeprivette / NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
☆107Updated 2 months ago
Related projects: ⓘ
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆101Updated this week
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆67Updated 3 weeks ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆181Updated last year
- ☆113Updated 11 months ago
- A Command-line tool which leverages the Tenable.io API to reduce the time it takes to get information that is common during remediation o…☆72Updated this week
- ☆77Updated last year
- NIST CyberSecurity Framework management tool☆155Updated 2 years ago
- Cybersecurity Incident Response Plan☆86Updated 3 years ago
- InsightVM helpful SQL queries☆57Updated 3 months ago
- Anvilogic Forge☆80Updated this week
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆28Updated 2 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆236Updated 4 months ago
- A tool that allows you to document and assess any security automation in your SOC☆40Updated 4 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆246Updated 7 months ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆140Updated 10 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆82Updated 8 months ago
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆155Updated 3 weeks ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆108Updated last year
- Resources for SANS CTI Summit 2021 presentation☆102Updated 10 months ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆122Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆93Updated 6 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆37Updated 4 months ago
- an awesome list of active defense resources☆111Updated 4 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆189Updated 10 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆159Updated last month
- Dorothy is a tool to test security monitoring and detection for Okta environments☆169Updated last month
- ☆40Updated last year
- Cyber Incident Response Team Playbook Battle Cards☆356Updated 4 months ago
- This is a companion to the Security Engineer Questions☆196Updated 9 months ago
- ☆83Updated 2 years ago