Mapping the information system / Cartographie du système d'information
☆493Mar 1, 2026Updated this week
Alternatives and similar repositories for mercator
Users that are interested in mercator are comparing it to the libraries listed below
Sorting:
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆337Updated this week
- Incident Notification Platform by @NC3-LU☆11Updated this week
- USB Scanning device☆32Sep 16, 2025Updated 5 months ago
- ☆166Nov 3, 2025Updated 4 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- Speed up your pentest enumeration☆82Oct 5, 2025Updated 5 months ago
- Data-Shield IPv4 Blocklist Community provides an official, curated registry of IPv4 addresses identified as malicious. Updated continuous…☆436Feb 27, 2026Updated last week
- Identify the accounts most vulnerable to dictionary attacks☆121Apr 2, 2025Updated 11 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆35Oct 21, 2025Updated 4 months ago
- CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports…☆3,617Updated this week
- ☆23Apr 11, 2024Updated last year
- An open source platform to support analysts to organise their case and tasks☆126Feb 26, 2026Updated last week
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated d…☆271Updated this week
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆129Dec 15, 2025Updated 2 months ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆275Feb 26, 2026Updated last week
- A browser extension to check compliance with the RGAA standard☆63May 15, 2025Updated 9 months ago
- HookPhish is a Python script designed to aid in the detection of phishing websites☆40Nov 15, 2023Updated 2 years ago
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- SwitchToOpen - The open source shift☆305Nov 21, 2025Updated 3 months ago
- Hardening Active Directory version 2☆377Dec 10, 2025Updated 2 months ago
- ☆10Apr 10, 2024Updated last year
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Nov 9, 2022Updated 3 years ago
- Protect your data in minutes !☆125Nov 5, 2024Updated last year
- Vulnerability Intelligence Platform☆2,547Feb 24, 2026Updated last week
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 10 months ago
- AIL project training materials☆39Feb 24, 2026Updated last week
- The official repository of PowersheLLM, a model for Powershell maliciousness detection using fine-tuned LLM☆13Jun 6, 2024Updated last year
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆23Feb 27, 2026Updated last week
- Security compliance platform - SOC2, CMMC, ASVS, ISO27001, HIPAA, NIST CSF, NIST 800-53, CSC CIS 18, PCI DSS, SSF tracking☆651Updated this week
- Authentication, authorization, traceability and auditability for SSH accesses.☆2,091Jan 30, 2026Updated last month
- Proxmox VE control CLI☆71Jul 9, 2025Updated 7 months ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 2 years ago
- This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engage…☆50Dec 21, 2025Updated 2 months ago
- 5 cves of ntp 4.2.8p15 founded by me.☆12Apr 11, 2023Updated 2 years ago
- ☆44Jan 22, 2026Updated last month
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Jan 31, 2025Updated last year