CloudSecurityAlliance / gsd-tools
Global Security Database Tools
☆42Updated last year
Alternatives and similar repositories for gsd-tools:
Users that are interested in gsd-tools are comparing it to the libraries listed below
- Global Security Database Project☆28Updated 2 years ago
- CVE.ICU code.☆42Updated this week
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆50Updated this week
- InfoSec OpenAI Examples☆19Updated last year
- ☆47Updated this week
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Adversary Emulation Planner☆39Updated 10 months ago
- Mirror of cisa.gov/kev data files☆46Updated this week
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 8 months ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆65Updated last month
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆46Updated this week
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆15Updated this week
- ☆18Updated 3 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- OWASP Foundation Web Respository☆31Updated 2 years ago
- A CALDERA plugin☆26Updated 9 months ago
- ☆41Updated 2 months ago
- pocket guide for core detection engineering concepts☆28Updated 2 years ago
- Stakeholder-Specific Vulnerability Categorization☆147Updated this week
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 7 months ago
- ☆10Updated 2 years ago
- Exploit Prediction Scoring System (EPSS)☆25Updated 2 years ago
- Automate vulnerability triage which prioritizes remediation over discovery☆17Updated last week
- A project to visualize the software supply chain☆50Updated last year
- Posture Attribute Collection and Evaluation☆23Updated last year
- ☆16Updated 2 years ago
- ☆18Updated 3 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- A community collection of security reviews of open source software components.☆93Updated last year