mitre / vulcanLinks
A web application to streamline the development of STIGs from SRGs
☆83Updated 2 weeks ago
Alternatives and similar repositories for vulcan
Users that are interested in vulcan are comparing it to the libraries listed below
Sorting:
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆171Updated last week
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆246Updated this week
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 4 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆46Updated last month
- Landing Page Content/Builder for MITRE Security Automation Framework☆29Updated 3 months ago
- Tools for security content automation, baseline tailoring, and overlay development.☆45Updated last year
- Controls Assessment Specification☆70Updated 10 months ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Updated 2 years ago
- A Security Results Viewer for the web with storage, teams and history☆35Updated 3 years ago
- Search a filesystem for indicators of compromise (IoC).☆83Updated last month
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆150Updated 2 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Updated 5 years ago
- Workflows for Shuffle☆24Updated 3 years ago
- A ComplianceAsCode blog☆30Updated 2 months ago
- OSSEM Common Data Model☆56Updated 3 years ago
- ☆121Updated last week
- Kestrel Jupyter Notebook Kernel☆10Updated 2 years ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆169Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆49Updated last year
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated 2 years ago
- A command-line and ruby API of utilities, converters and tools for creating, converting and processing security baseline formats, results…☆94Updated last year
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- Stakeholder-Specific Vulnerability Categorization☆171Updated 2 weeks ago
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- Tools for the OSCAL project☆37Updated 2 years ago
- ☆49Updated 2 years ago
- ☆53Updated last week
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated 3 weeks ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 4 years ago