daavelino / vulnerability-catalog
A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.
☆12Updated last year
Alternatives and similar repositories for vulnerability-catalog:
Users that are interested in vulnerability-catalog are comparing it to the libraries listed below
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 5 months ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆16Updated last year
- Build Automated Machine Images for MISP☆28Updated last year
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆9Updated 4 years ago
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆14Updated 4 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- hyperGRC is a lightweight, in-browser tool for managing compliance-as-code repositories in OpenControl format.☆25Updated 3 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- ☆11Updated 3 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated 7 months ago
- ☆21Updated 9 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆31Updated 8 years ago
- Wazuh - Release for Bosh.io☆11Updated last year
- Incident Response Playbooks☆14Updated 5 years ago
- Custom slash command to do a basic dnsrecon from within Slack☆12Updated 8 years ago
- Vulnerability Management tool using the CVE-Search database☆10Updated 8 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Python bindings for Yeti's API☆18Updated last year
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Updated 5 years ago
- A homebrewed cyber threat intelligence solution☆20Updated 12 years ago
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆52Updated 5 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated 3 weeks ago
- This Risk Rating Calculator is based on OWASP's Risk Rating Methodology☆22Updated 10 months ago
- NIST OSCAL SDK and CLI☆38Updated 4 years ago