wagov / wasocsharedLinks
WA Cyber Security Unit (DGOV Technical) site
☆44Updated this week
Alternatives and similar repositories for wasocshared
Users that are interested in wasocshared are comparing it to the libraries listed below
Sorting:
- ☆45Updated 3 years ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 11 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆131Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆126Updated 5 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆54Updated 2 years ago
- Cybersecurity Incident Response Plan☆108Updated 5 years ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Updated 4 months ago
- ☆87Updated 7 months ago
- Automating Security Detection Engineering, published by Packt☆63Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆83Updated last month
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- MISP to Sentinel integration☆74Updated 3 weeks ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆67Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated 11 months ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆117Updated 6 months ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Updated 3 years ago
- A Secure Controls Framework (SCF) Power BI App☆22Updated 11 months ago
- ☆94Updated 2 months ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆146Updated 3 months ago
- MISP Playbooks☆215Updated 2 weeks ago
- Anvilogic Forge☆110Updated last month
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆163Updated 7 months ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated 5 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆59Updated 3 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆49Updated this week
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆82Updated this week
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆151Updated last week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆101Updated last year
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated 8 months ago