COVAIL / MITRE_NIST
A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data
☆26Updated 5 years ago
Alternatives and similar repositories for MITRE_NIST:
Users that are interested in MITRE_NIST are comparing it to the libraries listed below
- InfoSec OpenAI Examples☆19Updated last year
- A curated threat modeling library collection☆22Updated last year
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆62Updated 10 months ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆30Updated last year
- CARET - A tool for viewing cyber analytic relationships☆26Updated 4 years ago
- ☆21Updated last year
- OWASP Foundation Web Respository☆28Updated 2 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Security conferences talks☆25Updated 4 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆27Updated 6 years ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 3 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- IriusRisk Community☆63Updated last year
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆68Updated 3 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆24Updated 5 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Updated last year
- CVE.ICU code.☆39Updated this week
- Virtual Security Operations Center☆50Updated last year
- ☆18Updated 3 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆99Updated last year
- ☆32Updated 2 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 3 weeks ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- MITRE Shield website☆19Updated 3 years ago
- Pivot into private VPC networks using a VPN connection☆41Updated 5 years ago