A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis
☆23Feb 2, 2025Updated last year
Alternatives and similar repositories for VulnBagel
Users that are interested in VulnBagel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MITRE ATT&CK Based App in Power BI☆18Feb 23, 2024Updated 2 years ago
- ☆18Jul 30, 2024Updated last year
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆110Jan 2, 2025Updated last year
- Docker build of GovReady☆14Nov 14, 2023Updated 2 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆17Feb 5, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A curated list of 20 free hacking books that cover various aspects of cybersecurity, ethical hacking, and penetration testing. This repos…☆38Dec 15, 2025Updated 3 months ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- Splunk TA for alert action to TheHive-project☆11May 13, 2020Updated 5 years ago
- Automatic Microsoft Sentinel Deployment☆16Apr 1, 2025Updated 11 months ago
- Python web app for previewing data in a Chrome Profile Folder☆24Jul 1, 2024Updated last year
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆22Jun 6, 2017Updated 8 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Active DIrectory Lab for Pentesting Practice☆25Aug 9, 2022Updated 3 years ago
- Forensics scripts aimed at automating & enhancing the Forensics Legend Eric Zimmerman's techniques, integrating the statistical detection…☆18Sep 7, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Un repositorio con plantillas y documentacion importante de ISO 27001.☆25Jun 9, 2022Updated 3 years ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Nov 13, 2025Updated 4 months ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆28Jan 27, 2017Updated 9 years ago
- Overview of existing mappings from and to cyber security controls☆19Oct 30, 2023Updated 2 years ago
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆18Mar 27, 2024Updated 2 years ago
- PowerShell scripts for running Magnet RESPONSE forensic collection tool in large enterprises.☆31Jan 9, 2025Updated last year
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Jan 8, 2023Updated 3 years ago
- License Key Generator and Validation written in C# .NET☆12Feb 28, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- Collection of Group Policy Templates to accelerate implementing ACSC Essential 8☆50Feb 9, 2023Updated 3 years ago
- Official Website Of The Sigma Project☆23Feb 16, 2026Updated last month
- ☆13May 22, 2024Updated last year
- This home lab is focused on setting up Wireshark Home-Lab and getting hands-on with practical scenarios. If you are a Network Security En…☆13Mar 27, 2024Updated 2 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- OpenID Shared Signals and Events (SSE) / Continuous Access Evaluation Protocol (CAEP) / Risk Incident Sharing and Coordination (RISC) JSO…☆15Jun 7, 2024Updated last year
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Transfer file over Dns☆10Nov 26, 2024Updated last year
- ☆12Apr 17, 2022Updated 3 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago