davidski / collector
⚖Open Source Toolkit for Conducting Quantitative Risk Assessment Interviews
☆34Updated last year
Alternatives and similar repositories for collector:
Users that are interested in collector are comparing it to the libraries listed below
- 🎓Materials for the Hands-On Introduction to OpenFAIR Risk Analysis with Tidyrisk☆13Updated 4 years ago
- ⚖Open Source Toolkit for Quantitative Risk Assessment☆168Updated 2 years ago
- Factor Analysis of Information Risk (FAIR) tool developed in R☆20Updated 7 years ago
- R package to work with the Shodan API☆17Updated 7 years ago
- ⚔️MITRE ATT&CK Machinations in R☆22Updated 4 years ago
- R package for working with data stored within VERIS framework☆13Updated 9 years ago
- R package for working with VERIS data☆24Updated last year
- Tools to Obtain and Work with Cloud Provider CIDR Blocks in R☆17Updated 6 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆37Updated 2 years ago
- Materials used by Product Management and Product Marketing☆12Updated 6 years ago
- read the docs version of risk management☆24Updated 2 years ago
- Analyst tool for creating pivot maps of data sources☆16Updated 7 years ago
- Open FAIR Course☆13Updated 5 years ago
- Vendor Security Model Contract☆98Updated 2 years ago
- ☆44Updated 2 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Updated 5 years ago
- R interface to the Censys "cyber"/scans search engine • https://www.censys.io/tutorial☆14Updated 2 years ago
- A curated threat modeling library collection☆22Updated last year
- OWASP Threat Dragon with Gitlab Integration☆25Updated 7 years ago
- Repository for the Open Information Security Risk Universe☆63Updated 2 years ago
- NIST SP 800-53 Rev 5 as Data☆23Updated 4 years ago
- Factor Analysis of Information Risk (FAIR) model written in Python. Managed and maintained by Hive Systems☆94Updated 3 months ago
- A repository for wardley maps related to security topics.☆47Updated 8 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- A collection of "network intelligence" utilities for R. ASN info, IP reputation, etc.☆39Updated 10 years ago
- A collection of scripts to look various things up in VERIS data such as VCDB.☆13Updated 7 years ago
- cloud.gov security policies and procedures☆25Updated 7 months ago
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆33Updated this week
- A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.☆12Updated last year
- ☆29Updated 6 years ago