mitre / safLinks
The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
☆156Updated this week
Alternatives and similar repositories for saf
Users that are interested in saf are comparing it to the libraries listed below
Sorting:
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆229Updated this week
- Controls Assessment Specification☆70Updated 3 months ago
- A web application to streamline the development of STIGs from SRGs☆76Updated last week
- Stakeholder-Specific Vulnerability Categorization☆153Updated this week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆48Updated this week
- A set of guidelines and best practices for an awesome engineering team☆242Updated last month
- OCSF Documentation☆132Updated 3 weeks ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆67Updated this week
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- Helm charts for running open source digital forensic tools in Kubernetes☆103Updated this week
- Search a filesystem for indicators of compromise (IoC).☆74Updated 3 weeks ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆364Updated this week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆122Updated 4 years ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆385Updated last year
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆493Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 8 months ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆88Updated 4 years ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆183Updated 11 months ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆165Updated last year
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆79Updated this week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆207Updated this week
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆282Updated last year
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆53Updated 3 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆238Updated last week
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆145Updated this week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated 11 months ago
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆139Updated 2 months ago
- ☆119Updated last year
- Built-in Panther detection rules and policies☆402Updated this week
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆189Updated 10 months ago