cloudsecurityalliance / gsd-project
Global Security Database Project
☆28Updated last year
Related projects: ⓘ
- Global Security Database Tools☆41Updated 9 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆64Updated 4 months ago
- ☆35Updated 5 months ago
- ☆16Updated last year
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆27Updated 8 months ago
- Posture Attribute Collection and Evaluation☆23Updated last year
- ☆76Updated this week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆56Updated this week
- ☆17Updated 4 months ago
- ☆14Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated 9 months ago
- Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆95Updated this week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆82Updated 8 months ago
- Continuous Audit Metrics☆24Updated 3 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆123Updated 7 months ago
- Stakeholder-Specific Vulnerability Categorization☆127Updated this week
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆45Updated 2 months ago
- pocket guide for core detection engineering concepts☆27Updated last year
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆47Updated last week
- A community collection of security reviews of open source software components.☆92Updated 6 months ago
- Kestrel Jupyter Notebook Kernel☆9Updated 11 months ago
- Code and Website For PatchThis.app☆24Updated this week
- OWASP Foundation Web Respository☆26Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆36Updated last month
- Exploit Prediction Scoring System (EPSS)☆20Updated 2 years ago
- OCSF Schema WEB Server☆39Updated last month
- This repository contains Enablement Documentation (STIX Shifter), Workgroup documents and materials (Endpoint), Working documents and ou…☆33Updated this week
- ☆60Updated 6 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆40Updated last week
- ☆45Updated this week