mitre / safLinks
The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
☆171Updated last week
Alternatives and similar repositories for saf
Users that are interested in saf are comparing it to the libraries listed below
Sorting:
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆246Updated this week
- A web application to streamline the development of STIGs from SRGs☆83Updated last week
- Controls Assessment Specification☆70Updated 10 months ago
- Stakeholder-Specific Vulnerability Categorization☆168Updated last week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆53Updated last week
- ☆192Updated last week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Updated 5 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆87Updated 2 weeks ago
- CISA CSAF Security Advisories☆93Updated this week
- OCSF Documentation☆151Updated 3 months ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆30Updated 2 years ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆215Updated this week
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆169Updated last year
- Helm charts for running open source digital forensic tools in Kubernetes☆181Updated last week
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆147Updated 6 months ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆389Updated last year
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆152Updated 2 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Updated 2 years ago
- ☆120Updated this week
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆196Updated last year
- VulnCheck's official command line tool☆150Updated 2 weeks ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Updated 3 years ago
- ☆49Updated 2 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆77Updated 3 months ago
- Built-in Panther detection rules and policies☆433Updated last week
- A tool that allows you to document and assess any security automation in your SOC☆48Updated last year
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆121Updated 2 weeks ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆52Updated 4 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆46Updated last month
- Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology☆90Updated last month