CloudSecurityAlliance / gsd-tools
Global Security Database Tools
☆42Updated last year
Alternatives and similar repositories for gsd-tools:
Users that are interested in gsd-tools are comparing it to the libraries listed below
- Global Security Database Project☆28Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆48Updated 6 months ago
- OWASP Foundation Web Respository☆28Updated 2 years ago
- Stakeholder-Specific Vulnerability Categorization☆135Updated this week
- InfoSec OpenAI Examples☆19Updated last year
- CyCAT.org API back-end server including crawlers☆30Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆63Updated this week
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆43Updated 2 years ago
- Threat Modeling Manifesto☆27Updated 6 months ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆54Updated this week
- ☆10Updated 2 years ago
- ☆32Updated 2 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆59Updated last month
- An LLM and OCR based Indicator of Compromise Extraction Tool☆32Updated last month
- CVE.ICU code.☆37Updated this week
- Knowledge Report Alert & Normalization Generator☆27Updated 9 months ago
- Exploit Prediction Scoring System (EPSS)☆24Updated 2 years ago
- ☆18Updated 3 years ago
- OWASP Threat Dragon core files☆28Updated 3 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆70Updated 8 months ago
- ☆39Updated this week
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated 2 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 4 months ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- ☆116Updated last year
- Posture Attribute Collection and Evaluation☆24Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆48Updated this week
- Adversary Emulation Planner☆38Updated 6 months ago
- Code and Website For PatchThis.app☆29Updated this week
- ☆38Updated 8 months ago