CloudSecurityAlliance / gsd-toolsView external linksLinks
Global Security Database Tools
☆43Dec 13, 2023Updated 2 years ago
Alternatives and similar repositories for gsd-tools
Users that are interested in gsd-tools are comparing it to the libraries listed below
Sorting:
- Global Security Database Project☆28Mar 4, 2023Updated 2 years ago
- Global Security Database☆318Apr 29, 2024Updated last year
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- CyCAT.org API back-end server including crawlers☆29Feb 4, 2023Updated 3 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- SightingDB is a database for Sightings☆22Jun 21, 2023Updated 2 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated 2 weeks ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- ☆10Apr 10, 2024Updated last year
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆12Jan 19, 2024Updated 2 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Jan 16, 2026Updated 3 weeks ago
- This is a mapping of CPEs to package urls created by using VulnerableCode's data☆10Aug 14, 2020Updated 5 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago
- Glossary of security terms☆12Jan 3, 2022Updated 4 years ago
- Home for TRANSITS materials☆25Jul 24, 2024Updated last year
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆89Feb 3, 2026Updated last week
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- Data orchestration and management.☆10Aug 4, 2025Updated 6 months ago
- Althttpd is a simple webserver that has run the https://sqlite.org/ website since 2004. Althttpd strives for simplicity, security, and lo…☆11Jun 12, 2021Updated 4 years ago
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆39Updated this week
- CVE.ICU code.☆50Updated this week
- A command line tool that queries the Open Corporates Database and returns data on corporations under the copyleft Open Database License.☆33Jan 22, 2023Updated 3 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- 5 cves of ntp 4.2.8p15 founded by me.☆12Apr 11, 2023Updated 2 years ago
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 2 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 7 months ago
- A Python implementation of our efficient Bloom filter library.☆29Feb 27, 2020Updated 5 years ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Aug 14, 2025Updated 6 months ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 4 months ago