mitre / safLinks
The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
☆161Updated last week
Alternatives and similar repositories for saf
Users that are interested in saf are comparing it to the libraries listed below
Sorting:
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆233Updated this week
- Controls Assessment Specification☆70Updated 4 months ago
- A web application to streamline the development of STIGs from SRGs☆78Updated this week
- Stakeholder-Specific Vulnerability Categorization☆159Updated last week
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆48Updated 2 weeks ago
- OCSF Documentation☆137Updated 2 months ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆185Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 10 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆123Updated 4 years ago
- Helm charts for running open source digital forensic tools in Kubernetes☆111Updated last week
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆387Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- VulnCheck's official command line tool☆136Updated this week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆375Updated this week
- Built-in Panther detection rules and policies☆410Updated last week
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆249Updated last month
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆283Updated last year
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆81Updated 3 weeks ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆191Updated 11 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆57Updated 3 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆70Updated last week
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆44Updated 5 years ago
- ☆119Updated last year
- ☆48Updated 2 years ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆143Updated last month
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 9 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆187Updated 11 months ago
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆143Updated last week