CloudSecurityAlliance / gsd-projectLinks
Global Security Database Project
☆28Updated 2 years ago
Alternatives and similar repositories for gsd-project
Users that are interested in gsd-project are comparing it to the libraries listed below
Sorting:
- Global Security Database Tools☆43Updated last year
- misp-guard is a mitmproxy addon that inspects and blocks outgoing events to external MISP instances via sync mechanisms (pull/push) based…☆14Updated this week
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆84Updated this week
- OWASP Foundation Web Respository☆31Updated 2 years ago
- Adversary Emulation Planner☆41Updated last year
- ☆47Updated last week
- ☆41Updated 4 months ago
- Stakeholder-Specific Vulnerability Categorization☆153Updated last week
- InfoSec OpenAI Examples☆19Updated last year
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆136Updated last year
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆71Updated 3 weeks ago
- A community collection of security reviews of open source software components.☆95Updated last year
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆29Updated last year
- ☆116Updated this week
- ☆19Updated 3 years ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated last year
- CVE.ICU code.☆43Updated this week
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- Tool to guess CPE name based on common software name☆100Updated 7 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆67Updated this week
- The source files and tools needed to build the OWASP Cornucopia decks in various languages☆74Updated last week
- Mirror of cisa.gov/kev data files☆51Updated this week
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆96Updated 5 months ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆48Updated last week
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆40Updated last month
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- A Python library and command line interface for CVE Services.☆67Updated last month