opencybersecurityalliance / PACELinks
Posture Attribute Collection and Evaluation
☆23Updated 2 years ago
Alternatives and similar repositories for PACE
Users that are interested in PACE are comparing it to the libraries listed below
Sorting:
- Firepit - STIX Columnar Storage☆16Updated last year
- Global Security Database Tools☆43Updated last year
- Automated testing, generation & manipulation of #osquery packs☆73Updated 10 months ago
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated 9 months ago
- A library of data visualization dashboard templates that can be imported into JupiterOne.☆17Updated this week
- Stakeholder-Specific Vulnerability Categorization☆160Updated this week
- ☆47Updated 5 months ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Adversary Emulation Planner☆41Updated last year
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated last year
- EPSS(Exploit Prediction Scoring System) API client☆19Updated this week
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆29Updated 6 months ago
- Python samples and utilities for Chronicle APIs☆84Updated 2 months ago
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆162Updated this week
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- A web application to streamline the development of STIGs from SRGs☆78Updated last week
- Workflows for Shuffle☆23Updated 2 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated 11 months ago
- Security Alert Decoration☆27Updated last month
- Short deep dive into Threat Hunting on AWS☆13Updated last year
- Structured Threat Intelligence Graph☆96Updated 4 months ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Updated last year
- STIX2 graph visualisation library in JS☆90Updated 2 months ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated 2 years ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆49Updated last year
- Scripts to import OSCAL example content into the Neo4J graph database☆28Updated 2 years ago
- CVE.ICU code.☆46Updated this week