daavelino / vulnerability-catalog
A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.
☆12Updated last year
Alternatives and similar repositories for vulnerability-catalog:
Users that are interested in vulnerability-catalog are comparing it to the libraries listed below
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated 2 years ago
- hyperGRC is a lightweight, in-browser tool for managing compliance-as-code repositories in OpenControl format.☆25Updated 3 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆16Updated 2 years ago
- Wazuh - Chef cookbooks☆22Updated last year
- Wazuh - Release for Bosh.io☆11Updated last year
- A service to test mail servers for best practices.☆37Updated 6 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- Build Automated Machine Images for MISP☆28Updated last year
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆9Updated 4 years ago
- An open source Governance Risk Compliance (GRC) solution for corporates and government☆27Updated 7 years ago
- A curated threat modeling library collection☆22Updated last year
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- DefectDojo Documentation☆17Updated 3 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Materials used by Product Management and Product Marketing☆12Updated 6 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated last year
- Build your own threat hunting maturity model☆11Updated 7 years ago
- This Risk Rating Calculator is based on OWASP's Risk Rating Methodology☆22Updated 11 months ago
- ☆10Updated last year
- experimental threat modeling tools☆14Updated 2 years ago
- ☆21Updated 9 months ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- ☆16Updated 4 years ago
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Updated 8 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Documentation of vmc☆16Updated 2 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆32Updated 8 years ago