CloudSecurityAlliance / gsd-toolsLinks
Global Security Database Tools
☆43Updated last year
Alternatives and similar repositories for gsd-tools
Users that are interested in gsd-tools are comparing it to the libraries listed below
Sorting:
- Global Security Database Project☆28Updated 2 years ago
- CVE.ICU code.☆43Updated this week
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆71Updated last month
- Adversary Emulation Planner☆41Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated last month
- Stakeholder-Specific Vulnerability Categorization☆158Updated this week
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆29Updated last year
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- pocket guide for core detection engineering concepts☆29Updated 2 years ago
- ☆45Updated 4 months ago
- Tool to guess CPE name based on common software name☆101Updated 8 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- Kestrel Jupyter Notebook Kernel☆9Updated last year
- A community collection of security reviews of open source software components.☆95Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆48Updated this week
- ☆19Updated 4 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆160Updated this week
- An LLM and OCR based Indicator of Compromise Extraction Tool☆34Updated 8 months ago
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated 9 months ago
- ☆47Updated this week
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆76Updated this week
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆69Updated last week
- AIL project training materials☆34Updated 2 weeks ago
- ☆41Updated 5 months ago
- Notes for High Availability MISP in AWS☆19Updated 5 years ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated last year
- Tools used by CSIRT and especially in the scope of CNW☆16Updated last month