mitre / safLinks
The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
☆166Updated this week
Alternatives and similar repositories for saf
Users that are interested in saf are comparing it to the libraries listed below
Sorting:
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆238Updated last week
- Controls Assessment Specification☆70Updated 6 months ago
- A web application to streamline the development of STIGs from SRGs☆80Updated this week
- ☆187Updated 3 weeks ago
- Stakeholder-Specific Vulnerability Categorization☆166Updated last week
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆389Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆126Updated 5 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆82Updated last week
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆116Updated last week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆49Updated this week
- Built-in Panther detection rules and policies☆421Updated this week
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 11 months ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆146Updated 3 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆211Updated this week
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆285Updated last year
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆29Updated 2 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆191Updated last year
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆88Updated 4 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆45Updated last week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆219Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆163Updated 7 months ago
- OCSF Documentation☆143Updated last week
- ☆48Updated 2 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆59Updated 3 years ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆55Updated 7 months ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆167Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆388Updated last week
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆148Updated 2 months ago
- Helm charts for running open source digital forensic tools in Kubernetes☆123Updated this week