CloudSecurityAlliance / gsd-toolsLinks
Global Security Database Tools
☆43Updated last year
Alternatives and similar repositories for gsd-tools
Users that are interested in gsd-tools are comparing it to the libraries listed below
Sorting:
- Global Security Database Project☆28Updated 2 years ago
- CVE.ICU code.☆47Updated this week
- Adversary Emulation Planner☆42Updated last year
- Stakeholder-Specific Vulnerability Categorization☆166Updated last week
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆81Updated 3 weeks ago
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated 11 months ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 4 months ago
- Tool to guess CPE name based on common software name☆105Updated last month
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- ☆119Updated 2 years ago
- Notes for High Availability MISP in AWS☆19Updated 5 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆49Updated this week
- AWS EKS Cluster Forensics☆23Updated 4 years ago
- Home for TRANSITS materials☆25Updated last year
- The Intelligent Process Lifecycle of Active Cyber Defenders☆33Updated 2 years ago
- Falcon Integration Gateway (FIG)☆21Updated this week
- ☆48Updated this week
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆66Updated last year
- A community collection of security reviews of open source software components.☆95Updated last year
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated last year
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 4 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 6 months ago
- Exploit Prediction Scoring System (EPSS)☆30Updated 3 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Updated 8 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆67Updated 4 months ago
- a curated list of useful threat modeling resources☆139Updated last year