mitre / safLinks
The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
☆171Updated last week
Alternatives and similar repositories for saf
Users that are interested in saf are comparing it to the libraries listed below
Sorting:
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆246Updated this week
- A web application to streamline the development of STIGs from SRGs☆83Updated last week
- Controls Assessment Specification☆70Updated 10 months ago
- OCSF Documentation☆151Updated 3 months ago
- Stakeholder-Specific Vulnerability Categorization☆168Updated last week
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Updated 2 years ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆215Updated this week
- Security Control Knowledge Graph☆31Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆287Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Updated 5 years ago
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆122Updated 2 weeks ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆389Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆53Updated last week
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆30Updated 2 years ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆147Updated 6 months ago
- ☆49Updated 2 years ago
- VulnCheck's official command line tool☆150Updated 2 weeks ago
- ☆192Updated last week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆225Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆88Updated this week
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Updated 3 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆296Updated last year
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆46Updated last month
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆76Updated 10 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆262Updated 6 months ago
- Anvilogic Forge☆114Updated 4 months ago
- Automating Security Detection Engineering, published by Packt☆65Updated last year
- Built-in Panther detection rules and policies☆433Updated last week
- Elevate your Security Operations Center's efficiency with Howler, the cutting-edge alert triage platform tailored for today's SOC demands…☆43Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83Updated last year