CloudSecurityAlliance / gsd-tools
Global Security Database Tools
☆42Updated last year
Alternatives and similar repositories for gsd-tools:
Users that are interested in gsd-tools are comparing it to the libraries listed below
- Global Security Database Project☆28Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 9 months ago
- Adversary Emulation Planner☆39Updated 9 months ago
- CVE.ICU code.☆39Updated this week
- ☆47Updated this week
- OWASP Foundation Web Respository☆31Updated 2 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆63Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆74Updated 11 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆57Updated 2 weeks ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 4 months ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆64Updated 3 weeks ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆45Updated this week
- Stakeholder-Specific Vulnerability Categorization☆146Updated this week
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated last month
- ☆16Updated last year
- Mirror of cisa.gov/kev data files☆45Updated last week
- ☆42Updated last month
- pocket guide for core detection engineering concepts☆28Updated last year
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- misp-guard is a mitmproxy addon that inspects and blocks outgoing events to external MISP instances via sync mechanisms (pull/push) based…☆14Updated 2 months ago
- Threat Modeling Manifesto☆28Updated 9 months ago
- ☆19Updated 4 years ago
- ☆27Updated 4 years ago
- Exploit Prediction Scoring System (EPSS)☆25Updated 2 years ago
- Posture Attribute Collection and Evaluation☆23Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆92Updated 2 months ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆72Updated last week
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆28Updated last year