A tool that allows you to document and assess any security automation in your SOC
☆49Oct 31, 2024Updated last year
Alternatives and similar repositories for automation-capability-matrix
Users that are interested in automation-capability-matrix are comparing it to the libraries listed below
Sorting:
- CrowdStrike Falcon log forwarder from falcon S3 bucket to your S3 bucket☆11Apr 15, 2021Updated 4 years ago
- ☆28Nov 25, 2025Updated 3 months ago
- Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.☆32Aug 31, 2023Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆296May 5, 2024Updated last year
- Flowpipe sample mods, demonstrating common pipeline patterns and how to use the Flowpipe library mods. Run directly or use as examples fo…☆19Oct 22, 2024Updated last year
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆67Jul 6, 2025Updated 7 months ago
- A knowledge base of actionable Incident Response techniques☆662May 31, 2022Updated 3 years ago
- ☆19Nov 23, 2022Updated 3 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆92Mar 2, 2021Updated 5 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Oct 14, 2024Updated last year
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆51Jun 21, 2025Updated 8 months ago
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- Pokes users about outstanding security risks found by Crowdstrike Spotlight or vmware Workspace ONE so they secure their own endpoint.☆30Feb 23, 2026Updated last week
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆389Jan 20, 2026Updated last month
- SIEM Tactics, Techiques, and Procedures☆698Feb 3, 2026Updated last month
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆33Jul 23, 2024Updated last year
- A Python Implementation of XQ Message SDK (V.2) which provides convenient access to the XQ Message API.☆12Feb 18, 2026Updated 2 weeks ago
- Configure Citrix Netscaler Loadbalancing for container platforms☆32Mar 9, 2021Updated 4 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆31Jul 27, 2023Updated 2 years ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- External monitoring for organization assets☆419Jun 5, 2024Updated last year
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Apr 5, 2024Updated last year
- Build a project with Express.js☆11Jan 31, 2021Updated 5 years ago
- Xipher is a curated collection of cryptographic primitives put together to perform key/password based asymmetric encryption☆14Feb 21, 2026Updated last week
- This is a templated to be used for QRL Jacking Sessions (Tested on Chrome,brave & firefox )☆13Feb 26, 2022Updated 4 years ago
- A tool for extracting and filtering URLs, IPs, domains, and subdomains from text or web pages, with built-in web scraping capabilities.☆14Mar 10, 2025Updated 11 months ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 6 months ago
- ☆13Aug 28, 2025Updated 6 months ago
- My personal profile!☆17Oct 25, 2024Updated last year
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- NIST transition-edge sensor (TES) data acquisition framework☆16Feb 24, 2026Updated last week
- pollen - A command-line tool for interacting with TheHive☆36Jun 6, 2019Updated 6 years ago
- Living off the False Positive!☆41Jan 31, 2025Updated last year