vz-risk / dbirLinks
public repo for github pages to display graphics
☆106Updated 5 months ago
Alternatives and similar repositories for dbir
Users that are interested in dbir are comparing it to the libraries listed below
Sorting:
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- ☆101Updated 4 years ago
- This content is analysis and research of the data sources currently listed in ATT&CK.☆411Updated last year
- A python package for use in generating fake data for SOC and security automation.☆170Updated 5 months ago
- Resources for SANS CTI Summit 2021 presentation☆103Updated last year
- Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology☆86Updated 3 weeks ago
- ☆175Updated last year
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆240Updated last year
- A community event for security researchers to share their favorite notebooks☆108Updated last year
- OASIS TC Open Repository: GitHub Pages site for STIX and TAXII☆101Updated last month
- A collection of intelligence about Log4Shell and its exploitation activity.☆183Updated 3 years ago
- ☆55Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- Creating a resource to help build and manage an Insider Threat program.☆78Updated 7 months ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆377Updated this week
- Dorothy is a tool to test security monitoring and detection for Okta environments☆186Updated last year
- ☆133Updated last year
- CASCADE Server☆272Updated 2 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 10 months ago
- Vocabulary for Event Recording and Incident Sharing (VERIS)☆613Updated 5 months ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆143Updated last month
- ☆77Updated 5 years ago
- ☆97Updated 2 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆246Updated 4 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆58Updated 5 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 4 months ago
- Zeek Log Cheatsheets☆297Updated 2 weeks ago
- Sublime rules for email attack detection, prevention, and threat hunting.☆324Updated this week