vz-risk / dbirLinks
public repo for github pages to display graphics
☆106Updated 9 months ago
Alternatives and similar repositories for dbir
Users that are interested in dbir are comparing it to the libraries listed below
Sorting:
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- ☆175Updated last year
- This content is analysis and research of the data sources currently listed in ATT&CK.☆414Updated 2 years ago
- ☆100Updated 5 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆77Updated 3 months ago
- Resources for SANS CTI Summit 2021 presentation☆104Updated 2 years ago
- CASCADE Server☆274Updated 3 years ago
- Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology☆90Updated 3 weeks ago
- A site for CISA directives☆167Updated last year
- Scripts to help work with configuration audit files☆90Updated 2 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆400Updated this week
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆127Updated 9 months ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆252Updated 4 years ago
- ☆55Updated 4 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆52Updated this week
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Updated last year
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆70Updated last year
- Hashes for vulnerable LOG4J versions☆156Updated 4 years ago
- ☆98Updated 3 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆242Updated last year
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- A python package for use in generating fake data for SOC and security automation.☆173Updated 10 months ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆57Updated 6 years ago
- OASIS TC Open Repository: GitHub Pages site for STIX and TAXII☆105Updated 2 months ago
- Zeek Log Cheatsheets☆301Updated 4 months ago
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆497Updated last year