A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis
☆23Feb 2, 2025Updated last year
Alternatives and similar repositories for VulnBagel
Users that are interested in VulnBagel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year
- MITRE ATT&CK Based App in Power BI☆18Feb 23, 2024Updated 2 years ago
- ☆18Jul 30, 2024Updated last year
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆111Jan 2, 2025Updated last year
- Docker build of GovReady☆14Nov 14, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Splunk TA for alert action to TheHive-project☆11May 13, 2020Updated 5 years ago
- Automatic Microsoft Sentinel Deployment☆16Apr 1, 2025Updated last year
- Python web app for previewing data in a Chrome Profile Folder☆24Jul 1, 2024Updated last year
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆22Jun 6, 2017Updated 8 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Active DIrectory Lab for Pentesting Practice☆25Aug 9, 2022Updated 3 years ago
- An ACAS/SCAP/CKL scan parser and report generator☆25Mar 1, 2021Updated 5 years ago
- Un repositorio con plantillas y documentacion importante de ISO 27001.☆26Jun 9, 2022Updated 3 years ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆35Nov 13, 2025Updated 5 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 4 months ago
- Use Neo4j to help visualize, explore and analyze GCP resources and IAM across your organization☆11Sep 1, 2020Updated 5 years ago
- AI-powered SAST accelerator built to speed up secure development.☆46Mar 30, 2026Updated 2 weeks ago
- License Key Generator and Validation written in C# .NET☆12Feb 28, 2023Updated 3 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- Collection of Group Policy Templates to accelerate implementing ACSC Essential 8☆50Feb 9, 2023Updated 3 years ago
- PowerShell scripts for running Magnet RESPONSE forensic collection tool in large enterprises.☆32Jan 9, 2025Updated last year
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆20Mar 27, 2024Updated 2 years ago
- Official Website Of The Sigma Project☆23Feb 16, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This home lab is focused on setting up Wireshark Home-Lab and getting hands-on with practical scenarios. If you are a Network Security En…☆13Mar 27, 2024Updated 2 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 9 months ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- OpenID Shared Signals and Events (SSE) / Continuous Access Evaluation Protocol (CAEP) / Risk Incident Sharing and Coordination (RISC) JSO…☆15Jun 7, 2024Updated last year
- Transfer file over Dns☆10Nov 26, 2024Updated last year
- Coalfire GCP RAMP/pak Reference Architecture☆13Mar 27, 2026Updated 3 weeks ago
- ☆12Apr 17, 2022Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆21Feb 24, 2024Updated 2 years ago
- A curated list of awesome social engineering resources.☆14May 29, 2017Updated 8 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Bloodhound Portable for Windows☆54Apr 1, 2023Updated 3 years ago
- The C4 Concurrent C Fuzzer☆14Nov 2, 2023Updated 2 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Sep 16, 2023Updated 2 years ago
- An eBPF-based behavioral monitor for AI coding agents.☆130Mar 28, 2026Updated 3 weeks ago
- Polar is a secure and scalable knowledge graph framework, designed to address the challenges posed by building big data systems in highly…☆22Updated this week
- OXA - Open XDR architecture☆14Apr 1, 2025Updated last year