holisticinfosec / EPSScallLinks
EPSScall
☆11Updated 3 years ago
Alternatives and similar repositories for EPSScall
Users that are interested in EPSScall are comparing it to the libraries listed below
Sorting:
- ☆15Updated last year
- ⚖Open Source Toolkit for Conducting Quantitative Risk Assessment Interviews☆36Updated last year
- Tools to Obtain and Work with Cloud Provider CIDR Blocks in R☆17Updated 6 years ago
- Automating simple report creating of threat intelligence using ChatGPT and Greynoise API.☆10Updated last year
- Workflows for Shuffle☆23Updated 2 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Updated last year
- Documentation used for Shuffle☆19Updated last week
- 🎓Materials for the Hands-On Introduction to OpenFAIR Risk Analysis with Tidyrisk☆13Updated 4 years ago
- OSSEM Common Data Model☆56Updated 2 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆38Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 9 months ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- Best practices in threat intelligence☆48Updated 2 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- ☆67Updated last month
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆37Updated this week
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Global Security Database Tools☆43Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆123Updated 4 years ago
- Adversary Emulation Planner☆41Updated last year
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- ☆48Updated 2 years ago
- Maltego transform for visualizing Nessus scan data☆47Updated 5 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Wrap any binary into a cached webserver☆53Updated 3 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- ☆49Updated last week
- Analyst tool for creating pivot maps of data sources☆17Updated 7 years ago
- ☆16Updated 4 years ago