mitre / safLinks
The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
☆166Updated this week
Alternatives and similar repositories for saf
Users that are interested in saf are comparing it to the libraries listed below
Sorting:
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆241Updated this week
- Controls Assessment Specification☆70Updated 8 months ago
- A web application to streamline the development of STIGs from SRGs☆82Updated 2 months ago
- Stakeholder-Specific Vulnerability Categorization☆166Updated last week
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Updated 2 years ago
- Helm charts for running open source digital forensic tools in Kubernetes☆174Updated last week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆130Updated 5 years ago
- OCSF Documentation☆146Updated 2 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆214Updated this week
- ☆191Updated last month
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆120Updated last week
- ☆49Updated 2 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆85Updated 2 weeks ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Updated 3 years ago
- A tool that allows you to document and assess any security automation in your SOC☆48Updated last year
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆390Updated last year
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆148Updated 5 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆402Updated last week
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆77Updated 2 months ago
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆45Updated 5 years ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆286Updated last year
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆168Updated last year
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆152Updated 2 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆51Updated 2 weeks ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆46Updated last week
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆193Updated last year
- ☆120Updated last month
- ☆168Updated 2 months ago