mitre / safLinks
The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
☆173Updated this week
Alternatives and similar repositories for saf
Users that are interested in saf are comparing it to the libraries listed below
Sorting:
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆246Updated this week
- A web application to streamline the development of STIGs from SRGs☆84Updated this week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆53Updated last week
- Stakeholder-Specific Vulnerability Categorization☆171Updated 2 weeks ago
- Controls Assessment Specification☆70Updated 10 months ago
- ☆192Updated this week
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆123Updated this week
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k …☆389Updated last year
- OCSF Documentation☆153Updated 2 weeks ago
- Built-in Panther detection rules and policies☆439Updated this week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Updated 5 years ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆215Updated this week
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆84Updated last month
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆88Updated 2 weeks ago
- A tool that allows you to document and assess any security automation in your SOC☆49Updated last year
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆150Updated 2 months ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆196Updated last year
- Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology☆90Updated last month
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Updated 2 years ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆288Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆296Updated last year
- Helm charts for running open source digital forensic tools in Kubernetes☆182Updated this week
- VulnCheck's official command line tool☆150Updated this week
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆152Updated 2 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆403Updated last week
- OSSEM Common Data Model☆56Updated 3 years ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆263Updated 7 months ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆30Updated 2 years ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆96Updated 2 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Updated 3 years ago