IAI-Cyber / TRADESLinks
TRADES Tool
☆18Updated 9 months ago
Alternatives and similar repositories for TRADES
Users that are interested in TRADES are comparing it to the libraries listed below
Sorting:
- Tools for the OSCAL project☆36Updated 2 years ago
- ☆21Updated last year
- ☆18Updated 3 years ago
- Development of the NIST vulnerability data ontology (Vulntology).☆42Updated last week
- Stakeholder-Specific Vulnerability Categorization☆164Updated this week
- OWASP Ontology-driven Threat Modelling framework☆41Updated 2 years ago
- A Java library to support processing OSCAL content☆34Updated last week
- Security Control Knowledge Graph☆29Updated last year
- A simple open source command line tool to support common operations over OSCAL content.☆54Updated 2 months ago
- Threats Manager Platform Core libraries and SDK☆75Updated 6 months ago
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆44Updated 5 years ago
- An initial OpenAPI definition of an OSCAL REST API.☆39Updated last year
- CISA CSAF Security Advisories☆83Updated last week
- Core model including reused documentation☆99Updated 4 months ago
- ☆16Updated 4 years ago
- Various deployments of the OSCAL editor☆46Updated last year
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆51Updated this week
- OWASP Foundation Web Respository☆31Updated 2 years ago
- Scripts to import OSCAL example content into the Neo4J graph database☆29Updated 2 years ago
- Computer Aided Integration of Requirements and Information Security - Server☆164Updated last year
- ☆123Updated 3 weeks ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆51Updated last year
- KEV EPSS Data☆27Updated this week
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆55Updated 6 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆80Updated last week
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆164Updated this week
- ☆48Updated 2 years ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆211Updated this week
- ☆88Updated 3 weeks ago
- This repository is a collection of resources to help facilitate compliance innovation utilizing Cloud, DevSecOps and Software Factory tec…☆74Updated last year