RogoLabs / patchthisappLinks
Code and Website For PatchThis.app
☆32Updated this week
Alternatives and similar repositories for patchthisapp
Users that are interested in patchthisapp are comparing it to the libraries listed below
Sorting:
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆212Updated this week
- Monthly CVE Stats☆43Updated this week
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Updated last year
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Updated 5 months ago
- ☆43Updated last month
- VulnCheck's official command line tool☆140Updated 2 weeks ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆29Updated 9 months ago
- ☆166Updated 2 months ago
- ☆120Updated last month
- ☆19Updated 3 years ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Updated 2 years ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 9 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated last year
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆42Updated last week
- pocket guide for core detection engineering concepts☆30Updated 2 years ago
- Anvilogic Forge☆112Updated 2 months ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆59Updated 3 years ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆152Updated 2 weeks ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- OWASP Foundation Web Respository☆31Updated last month
- GCP GOAT is the vulnerable application for learn the GCP Security☆69Updated 6 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 3 years ago
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆83Updated last week
- Stakeholder-Specific Vulnerability Categorization☆166Updated last week
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆93Updated this week
- Conference presentations☆60Updated last month