ThalesGroup / security-risk-assessment-toolLinks
The ISRA security-risk-assessment-tool project is an Electron based application used to do security risk assessments at a technical level
☆34Updated last week
Alternatives and similar repositories for security-risk-assessment-tool
Users that are interested in security-risk-assessment-tool are comparing it to the libraries listed below
Sorting:
- ☆80Updated 2 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆16Updated last month
- A realistic simulator of Active Directory domains☆40Updated 3 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 2 months ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆37Updated 3 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated this week
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 8 years ago
- Nessus Audit files☆33Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated last year
- Simulates a compromise in a cloud and container environment☆32Updated 9 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆29Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆61Updated 5 years ago
- ☆15Updated 3 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Automatic detection engineering technical state compliance☆55Updated last year
- Visual Studio Code extension for MITRE ATT&CK☆54Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 11 months ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 11 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆66Updated last year
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated 3 months ago