Stars
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Controls Assessment Specification
Set of SIGMA rules (>320) mapped to MITRE ATT&CK tactic and techniques
Detect Tactics, Techniques & Combat Threats
HardeningKitty - Checks and hardens your Windows configuration
An attempt to answer the age old interview question "What happens when you type google.com into your browser and press enter?"
Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. Sugar-Free and Secure: no any external dependencies except f…
This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.
This is a step-by-step guide to implementing a DevSecOps program for any size organization
Kali Linux Fixes for Newly Imported VM's
The strictest and most opinionated python linter ever!