CesareGallotti / VERALinks
Very easy risk assessment (for infosec and more)
☆46Updated 4 months ago
Alternatives and similar repositories for VERA
Users that are interested in VERA are comparing it to the libraries listed below
Sorting:
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆478Updated last week
- ☆218Updated last year
- SOCFortress CoPilot☆417Updated this week
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆427Updated 2 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆718Updated 4 months ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆403Updated last year
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆729Updated 10 months ago
- Captures network traffic app made in Rust.☆74Updated this week
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆412Updated 7 months ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆744Updated 4 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆437Updated this week
- Open Source Security Operations Center Documentation☆203Updated 5 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆268Updated 6 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆84Updated last week
- Playbooks for SOC Analysts☆639Updated 3 years ago
- MCP Server for Wazuh SIEM☆153Updated last week
- NIST CSF Maturity Toolkit☆113Updated 6 months ago
- A comprehensive Windows security auditing and threat detection toolkit. Features 58 production-ready PowerShell functions organized into …☆68Updated 2 months ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆461Updated last week
- A tool for mapping cyber crime☆223Updated 8 months ago
- ☆164Updated last month
- A production ready Dockered MISP☆298Updated last week
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis☆405Updated 2 months ago
- A curated list of Awesome Threat Intelligence Blogs☆473Updated this week
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆116Updated 9 months ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆280Updated 2 years ago
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated d…☆257Updated this week