CloudSecurityAlliance / gsd-toolsLinks
Global Security Database Tools
☆43Updated last year
Alternatives and similar repositories for gsd-tools
Users that are interested in gsd-tools are comparing it to the libraries listed below
Sorting:
- Global Security Database Project☆28Updated 2 years ago
- OWASP Foundation Web Respository☆31Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆51Updated this week
- Stakeholder-Specific Vulnerability Categorization☆153Updated this week
- CVE.ICU code.☆42Updated this week
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆47Updated last week
- Adversary Emulation Planner☆39Updated 11 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 6 months ago
- pocket guide for core detection engineering concepts☆28Updated 2 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Updated 4 months ago
- ☆65Updated last year
- Workflows for Shuffle☆23Updated 2 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- ☆16Updated 2 years ago
- ☆41Updated 3 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- Threat Modeling Manifesto☆28Updated 11 months ago
- ☆47Updated this week
- Code and Website For PatchThis.app☆29Updated this week
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆70Updated this week
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- ☆19Updated 4 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆77Updated last year
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Updated 4 months ago
- Sharing Threat Hunting runbooks☆26Updated 5 years ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated last year
- Public release of Whalehoney Honeypot☆29Updated 3 years ago