Vulnetix / vulnetixLinks
Automate vulnerability triage which prioritizes remediation over discovery
☆19Updated last month
Alternatives and similar repositories for vulnetix
Users that are interested in vulnetix are comparing it to the libraries listed below
Sorting:
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆77Updated 5 months ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated 2 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆42Updated last year
- GCP CSPM using Google Sheets☆36Updated 4 months ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆110Updated 2 weeks ago
- Tool for collecting vulnerability data from various sources (used to build the grype database)☆101Updated this week
- Automated testing, generation & manipulation of #osquery packs☆73Updated 9 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆174Updated 8 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 3 years ago
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 9 months ago
- ☆30Updated 9 months ago
- ☆113Updated 2 weeks ago
- A tool for preventing the installation of malicious npm and PyPI packages☆153Updated this week
- The security workflow engine!☆119Updated this week
- A CLI that scans for sensitive data in source code☆14Updated 2 years ago
- boostsecurityio/poutine☆308Updated last week
- 💅🏽 analyzes your github actions☆93Updated last month
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 11 months ago
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆150Updated last week
- Documenting your Threat Models with HCL☆432Updated 2 months ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆23Updated 10 months ago
- ☆25Updated last year
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆103Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- App that simplifies building decision trees to model adverse scenarios☆215Updated last year
- OWASP Foundation Web Respository☆55Updated 2 years ago