Ivan-Markovic / OWASP-Risk-Assessment-CalculatorLinks
This Risk Rating Calculator is based on OWASP's Risk Rating Methodology
☆22Updated last year
Alternatives and similar repositories for OWASP-Risk-Assessment-Calculator
Users that are interested in OWASP-Risk-Assessment-Calculator are comparing it to the libraries listed below
Sorting:
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 6 years ago
- Virtual Security Operations Center☆52Updated 2 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 4 years ago
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- Tools for AWS forensics☆65Updated 9 years ago
- ☆120Updated last week
- Cloud Security Operations Orchestrator☆188Updated last year
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 5 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Updated 6 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 9 months ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Updated 3 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Updated 5 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆32Updated 2 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Updated last year
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 4 years ago
- Serverless honeytoken 🕵🏻♂️☆81Updated 3 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆52Updated 3 years ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆93Updated 2 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆54Updated 2 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 7 years ago
- Recon Hunt Queries☆79Updated 4 years ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 5 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆34Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated 2 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 3 years ago
- Security conferences talks☆25Updated 5 years ago