CesareGallotti / VERALinks
Very easy risk assessment (for infosec and more)
☆37Updated last week
Alternatives and similar repositories for VERA
Users that are interested in VERA are comparing it to the libraries listed below
Sorting:
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆79Updated 3 months ago
- AI-Powered Dark Web OSINT Tool☆78Updated last week
- ☆105Updated last month
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆173Updated 2 months ago
- Knowledge base on cybercriminal concealment techniques☆72Updated last month
- ☆213Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆90Updated last year
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆162Updated this week
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆427Updated last week
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆113Updated last week
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆191Updated 11 months ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 9 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated 2 months ago
- MISP Playbooks☆203Updated 2 weeks ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆256Updated 3 months ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆142Updated last year
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆82Updated 2 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- ☆180Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated 11 months ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆51Updated 5 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆196Updated last week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆698Updated last week
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆130Updated last year
- Open Source Security Operations Center Documentation☆188Updated last month
- A collection of methods to learn who the owner of an IP address is.☆162Updated 3 weeks ago
- Building a consolidated RSS feed for articles about cyberattacks☆68Updated this week
- Mapping of open-source detection rules and atomic tests.☆168Updated 5 months ago
- List of past and future infosec related events.☆156Updated this week