Ivan-Markovic / OWASP-Risk-Assessment-CalculatorLinks
This Risk Rating Calculator is based on OWASP's Risk Rating Methodology
☆22Updated last year
Alternatives and similar repositories for OWASP-Risk-Assessment-Calculator
Users that are interested in OWASP-Risk-Assessment-Calculator are comparing it to the libraries listed below
Sorting:
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Updated 5 years ago
- Virtual Security Operations Center☆52Updated 2 years ago
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- ☆120Updated last month
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 8 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- Recon Hunt Queries☆79Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Tools for AWS forensics☆65Updated 9 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Updated 2 years ago
- ☆34Updated 4 years ago
- ☆30Updated 7 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 4 years ago
- Serverless honeytoken 🕵🏻♂️☆81Updated 2 years ago
- Cloud Security Operations Orchestrator☆188Updated last year
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆50Updated 3 months ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- Incident Response Playbooks☆15Updated 6 years ago
- Defensomania is a security monitoring and incident response card game.☆63Updated 2 years ago
- ☆55Updated 4 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 7 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 4 months ago
- Workflows for Shuffle☆24Updated 3 years ago