mitre / saf
The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
☆150Updated this week
Alternatives and similar repositories for saf:
Users that are interested in saf are comparing it to the libraries listed below
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆224Updated this week
- A web application to streamline the development of STIGs from SRGs☆74Updated 2 months ago
- Controls Assessment Specification☆70Updated last month
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆352Updated this week
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆386Updated last year
- Cyber Incident Response Team Playbook Battle Cards☆375Updated last year
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆211Updated last month
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 6 months ago
- Built-in Panther detection rules and policies☆379Updated this week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆46Updated last week
- Search a filesystem for indicators of compromise (IoC).☆71Updated 2 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆232Updated last week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆41Updated 2 weeks ago
- A set of guidelines and best practices for an awesome engineering team☆233Updated last month
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆143Updated 8 months ago
- OWASP Foundation Web Respository☆23Updated 2 months ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆492Updated last year
- Stakeholder-Specific Vulnerability Categorization☆147Updated this week
- Dorothy is a tool to test security monitoring and detection for Okta environments☆182Updated 9 months ago
- OSSEM Common Data Model☆55Updated 2 years ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆276Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆162Updated 2 months ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated last month
- SIEGMA - Transform Sigma rules into SIEM consumables☆149Updated 2 months ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆117Updated 2 months ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆85Updated 4 years ago
- NIST CyberSecurity Framework management tool☆163Updated 3 years ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆49Updated last month
- Cisco Orbital - Osquery queries by Talos☆132Updated 8 months ago