Ostorlab / agent_nmapLinks
Agent responsible for network discovery and security auditing using Nmap.
☆22Updated last week
Alternatives and similar repositories for agent_nmap
Users that are interested in agent_nmap are comparing it to the libraries listed below
Sorting:
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆215Updated this week
- Ostorlab Github Actions to complement your CI/CD with Security Testing.☆20Updated 4 months ago
- One Conference 2024☆111Updated last year
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆463Updated this week
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆95Updated 2 months ago
- ☆363Updated 4 months ago
- OWASP Foundation Web Respository☆347Updated this week
- Gram is Klarna's own threat model diagramming tool☆331Updated 2 weeks ago
- ☆381Updated last year
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆114Updated 6 months ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆482Updated 7 months ago
- Stakeholder-Specific Vulnerability Categorization☆170Updated 2 weeks ago
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated d…☆267Updated this week
- Tool to guess CPE name based on common software name☆117Updated this week
- This is a companion to the Security Engineer Questions☆205Updated 2 years ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆109Updated 2 years ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆102Updated 3 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆225Updated last year
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆142Updated 11 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆139Updated 2 years ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆301Updated this week
- ☆138Updated last week
- CISA CSAF Security Advisories☆94Updated this week
- A full insecure kubernetes application for testing security tools☆90Updated 3 months ago
- A repo to conduct vulnerability enrichment.☆718Updated this week
- This is a collection of threat detection rules / rules engines that I have come across.☆296Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆88Updated last week
- A curated list of large language model tools for cybersecurity research.☆481Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆288Updated 2 years ago