mitre / safLinks
The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
☆150Updated this week
Alternatives and similar repositories for saf
Users that are interested in saf are comparing it to the libraries listed below
Sorting:
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆225Updated this week
- A web application to streamline the development of STIGs from SRGs☆74Updated 2 months ago
- Controls Assessment Specification☆70Updated last month
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆358Updated this week
- Cyber Incident Response Team Playbook Battle Cards☆377Updated last year
- Search a filesystem for indicators of compromise (IoC).☆73Updated last week
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆385Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 7 months ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆492Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆278Updated last year
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆41Updated last month
- Stakeholder-Specific Vulnerability Categorization☆150Updated last week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆237Updated 3 weeks ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆47Updated last month
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆74Updated 2 months ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆85Updated 4 years ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆182Updated 9 months ago
- NIST CyberSecurity Framework management tool☆165Updated 3 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆151Updated 2 months ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆216Updated 2 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆97Updated last year
- ☆95Updated 2 years ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆144Updated this week
- This content is analysis and research of the data sources currently listed in ATT&CK.☆409Updated last year
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆133Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆199Updated this week
- A ComplianceAsCode blog☆27Updated last month
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year