RiskBasedPrioritization / RiskBasedPrioritization.github.io
☆9Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for RiskBasedPrioritization.github.io
- Documentation on the Cyber Defense Matrix☆24Updated last year
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆30Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆61Updated this week
- OWASP Foundation Web Respository☆26Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆67Updated 6 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆48Updated last week
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 2 months ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- A Command-line tool which leverages the Tenable.io API to reduce the time it takes to get information that is common during remediation o…☆72Updated last month
- Stakeholder-Specific Vulnerability Categorization☆128Updated this week
- AI featured threat modeling and security review action☆40Updated 5 months ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆46Updated 4 months ago
- ☆18Updated 2 years ago
- ☆36Updated 6 months ago
- ☆114Updated last year
- Threat Modeling Manifesto☆27Updated 3 months ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆50Updated this week
- ☆80Updated 3 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆51Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆104Updated 9 months ago
- Collection of resources related to the Center for Threat-Informed Defense☆77Updated 5 months ago
- ☆69Updated 2 months ago
- Security Monitoring Resolution Categories☆138Updated 2 years ago
- ☆17Updated 6 months ago
- Sample scan files for testing DefectDojo imports☆75Updated 2 weeks ago
- A tool that allows you to document and assess any security automation in your SOC☆41Updated last week
- ☆17Updated 3 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆50Updated 2 weeks ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆46Updated 7 years ago
- ☆16Updated last year