CesareGallotti / VERA
Very easy risk assessment (for infosec and more)
☆29Updated 2 weeks ago
Alternatives and similar repositories for VERA
Users that are interested in VERA are comparing it to the libraries listed below
Sorting:
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆87Updated last year
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 7 months ago
- MISP Playbooks☆200Updated 3 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆78Updated 2 months ago
- AI-Powered Dark Web OSINT Tool☆66Updated 2 weeks ago
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆93Updated this week
- An open source platform to support analysts to organise their case and tasks☆71Updated last week
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆13Updated last year
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆127Updated 9 months ago
- ☆89Updated this week
- God Mode Detection Rules☆134Updated 9 months ago
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆165Updated last month
- ☆103Updated this week
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆77Updated last month
- A production ready Dockered MISP☆233Updated this week
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆247Updated last month
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆164Updated 3 months ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 3 years ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆386Updated this week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 4 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆175Updated 11 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 5 months ago
- Tools for simulating threats☆183Updated last year
- Generate a matrix based on an inventory of InfoSec tools☆23Updated 10 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆156Updated last month
- Cyber threat intelligence tool suite.☆36Updated last month
- FIT is a Python3 application for forensic acquisition of contents like web pages, emails, social media, etc. directly from the internet.☆81Updated 2 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 6 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆88Updated 6 months ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆54Updated last week