Vulnetix / vulnetixLinks
Automate vulnerability triage which prioritizes remediation over discovery
☆19Updated last week
Alternatives and similar repositories for vulnetix
Users that are interested in vulnetix are comparing it to the libraries listed below
Sorting:
- Compares and analyzes GCP IAM roles.☆77Updated 4 months ago
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆42Updated last year
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- A tool to check the security settings of Github Organizations.☆71Updated 2 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated 2 years ago
- Security Alert Decoration☆27Updated 2 months ago
- ☆29Updated 8 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆48Updated last week
- Tool for collecting vulnerability data from various sources (used to build the grype database)☆99Updated last week
- ☆46Updated 8 months ago
- DefectDojo Community Content☆18Updated last month
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Updated 4 years ago
- OWASP Foundation Web Respository☆55Updated 2 years ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated last year
- Coalfire AWS RAMP/pak Reference Architecture☆36Updated 10 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆65Updated 3 weeks ago
- Automated testing, generation & manipulation of #osquery packs☆73Updated 9 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆71Updated 2 years ago
- Sharing software supply chain security open source projects☆50Updated 2 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- ☆16Updated 11 months ago
- ☆33Updated 3 years ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆22Updated 9 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆172Updated 7 months ago
- A Golang program to rotate AWS & GCP account keys☆66Updated 2 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 2 years ago
- AWS honey token manager☆87Updated 11 months ago
- Updated incident response generator for training classes☆44Updated 4 years ago