mitre / saf
The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
☆147Updated this week
Alternatives and similar repositories for saf:
Users that are interested in saf are comparing it to the libraries listed below
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆218Updated this week
- A web application to streamline the development of STIGs from SRGs☆72Updated 2 weeks ago
- Controls Assessment Specification☆69Updated this week
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆382Updated 11 months ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 5 months ago
- Stakeholder-Specific Vulnerability Categorization☆140Updated this week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆345Updated this week
- A Command-line tool which leverages the Tenable.io API to reduce the time it takes to get information that is common during remediation o…☆74Updated 6 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 5 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆54Updated 3 years ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆272Updated last year
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 10 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆91Updated last year
- Search a filesystem for indicators of compromise (IoC).☆70Updated last month
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆72Updated 10 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆165Updated this week
- Anvilogic Forge☆95Updated last week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆45Updated this week
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆87Updated 3 weeks ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆122Updated 8 months ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆48Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆225Updated 2 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Global Security Database Tools☆43Updated last year
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆161Updated 2 weeks ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆112Updated last week
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆207Updated 3 weeks ago
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆72Updated 4 months ago