holisticinfosec / EPSScallLinks
EPSScall
☆11Updated 3 years ago
Alternatives and similar repositories for EPSScall
Users that are interested in EPSScall are comparing it to the libraries listed below
Sorting:
- ⚖Open Source Toolkit for Conducting Quantitative Risk Assessment Interviews☆37Updated last year
- Automating simple report creating of threat intelligence using ChatGPT and Greynoise API.☆10Updated 2 years ago
- ☆15Updated 2 years ago
- 🎓Materials for the Hands-On Introduction to OpenFAIR Risk Analysis with Tidyrisk☆14Updated 5 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Updated 2 years ago
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆39Updated this week
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 4 years ago
- Analyst tool for creating pivot maps of data sources☆16Updated 8 years ago
- Tools to Obtain and Work with Cloud Provider CIDR Blocks in R☆17Updated 7 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 3 years ago
- Adversary Emulation Planner☆42Updated last month
- 🕵🏽 macOS Big Sur desktop app to monitor active TCP connections through the lens of GreyNoise☆33Updated 3 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated 2 years ago
- Global Security Database Tools☆43Updated 2 years ago
- R interface to the Censys "cyber"/scans search engine • https://www.censys.io/tutorial☆14Updated 3 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 5 months ago
- OSSEM Common Data Model☆56Updated 3 years ago
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆45Updated 4 months ago
- ☆78Updated 3 weeks ago
- Tools and scripts by Arctic Wolf☆70Updated 6 months ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- ⚔️MITRE ATT&CK Machinations in R☆23Updated 5 years ago
- Knowledge Report Alert & Normalization Generator☆26Updated this week
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning☆23Updated last week
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Updated 5 years ago
- Best practices in threat intelligence☆50Updated 3 years ago
- ☆49Updated 2 years ago
- Wrap any binary into a cached webserver☆57Updated 3 years ago