davidski / tidyrisk-workshopLinks
🎓Materials for the Hands-On Introduction to OpenFAIR Risk Analysis with Tidyrisk
☆13Updated 4 years ago
Alternatives and similar repositories for tidyrisk-workshop
Users that are interested in tidyrisk-workshop are comparing it to the libraries listed below
Sorting:
- ⚖Open Source Toolkit for Conducting Quantitative Risk Assessment Interviews☆36Updated last year
- Factor Analysis of Information Risk (FAIR) tool developed in R☆21Updated 7 years ago
- ⚖Open Source Toolkit for Quantitative Risk Assessment☆169Updated 2 years ago
- Analyst tool for creating pivot maps of data sources☆17Updated 7 years ago
- EPSScall☆11Updated 3 years ago
- R package to work with the Shodan API☆17Updated 7 years ago
- Factor Analysis of Information Risk (FAIR) model written in Python. Managed and maintained by Hive Systems☆96Updated 3 weeks ago
- ☆46Updated 2 years ago
- NIST SP 800-53 Rev 5 as Data☆23Updated 5 years ago
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆35Updated this week
- R interface to the Censys "cyber"/scans search engine • https://www.censys.io/tutorial☆14Updated 2 years ago
- Repository for the Open Information Security Risk Universe☆64Updated 3 years ago
- ⚔️MITRE ATT&CK Machinations in R☆23Updated 4 years ago
- R package for working with VERIS data☆24Updated last year
- Tools to Obtain and Work with Cloud Provider CIDR Blocks in R☆17Updated 6 years ago
- Useful tools for working with the PassiveTotal API in R☆13Updated 9 years ago
- ☆15Updated last year
- 👀 Analyze Websites and Resources They Request☆23Updated 6 years ago
- Automating simple report creating of threat intelligence using ChatGPT and Greynoise API.☆10Updated last year
- Integrate Zeek with Alienvault OTX☆25Updated 4 years ago
- Controls Assessment Specification☆70Updated 3 months ago
- A collection of "network intelligence" utilities for R. ASN info, IP reputation, etc.☆39Updated 10 years ago
- MITRE package gives you an approach to cybersecurity data sets.☆18Updated 2 years ago
- Adversary Emulation Planner☆41Updated last year
- Falcon Data Replicator☆31Updated 3 months ago
- Zeek support for Community ID flow hashing.☆36Updated 2 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 8 months ago
- setup zeek, previously Bro IDS☆18Updated 2 months ago
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- A Secure Controls Framework (SCF) Power BI App☆21Updated 8 months ago