daavelino / vulnerability-catalogLinks
A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.
☆12Updated last year
Alternatives and similar repositories for vulnerability-catalog
Users that are interested in vulnerability-catalog are comparing it to the libraries listed below
Sorting:
- generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)☆32Updated last year
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated 2 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated last year
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- Best practices in threat intelligence☆47Updated 2 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- Materials used by Product Management and Product Marketing☆12Updated 6 years ago
- Incident Response Playbooks☆14Updated 6 years ago
- hyperGRC is a lightweight, in-browser tool for managing compliance-as-code repositories in OpenControl format.☆25Updated 3 years ago
- Security Blueprint for Startups☆39Updated 5 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Updated 3 months ago
- An open source Governance Risk Compliance (GRC) solution for corporates and government☆27Updated 8 years ago
- ☆16Updated 3 years ago
- ☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆102Updated 4 years ago
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆10Updated 5 years ago
- Example Express application for collecting data from the Stethoscope app☆14Updated 7 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆16Updated 2 years ago
- cloud.gov security policies and procedures☆25Updated last month
- ☆10Updated last year
- OWASP Foundation Web Respository☆27Updated 2 weeks ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- Sharing Threat Hunting runbooks☆26Updated 6 years ago
- A repository for wardley maps related to security topics.☆46Updated 8 years ago
- A curated threat modeling library collection☆22Updated last year
- Machine readable cybersecurity compliance standards library for Python, starting with FISMA and NIST Risk Management Framework☆61Updated 5 years ago
- read the docs version of risk management☆25Updated 2 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago