joval / jOVAL
An open-source JAXB data model for SCAP specification formats.
☆57Updated 2 years ago
Alternatives and similar repositories for jOVAL:
Users that are interested in jOVAL are comparing it to the libraries listed below
- The OVAL Language Schemas☆87Updated 5 months ago
- A minimal Java client for the Nessus XML RPC interface☆23Updated 7 years ago
- OVAL Documentation☆14Updated 7 years ago
- The OVAL Language Sandbox☆44Updated 4 years ago
- ☆275Updated last year
- Tools for conducting analysis of CVE data in Elasticsearch☆74Updated this week
- Tools for security content automation, baseline tailoring, and overlay development.☆43Updated 6 months ago
- Bro/Zeek integration with osquery☆94Updated 4 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated last year
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- A repository for OSSEC rules and decoders☆54Updated last year
- WebUI of MineMeld☆43Updated last year
- Engine of MineMeld☆141Updated 2 years ago
- SCAP Scanner And Tailoring Graphical User Interface☆229Updated last year
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- Landing Page Content/Builder for MITRE Security Automation Framework☆28Updated 2 weeks ago
- Vulnerability Information Aggregator for CVEs☆118Updated 5 years ago
- A set of OVAL Definitions that provides a simple way to test the capability of OVAL Definition Evaluators.☆26Updated 8 years ago
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆92Updated 9 months ago
- Nessus Vulnerability visualization for the web☆31Updated 9 years ago
- Threat Alert Logic Repository☆92Updated 6 years ago
- Qualys community open source scripts. Please note these are provided as-is and are not supported.☆110Updated 7 months ago
- ☆20Updated 4 years ago
- Apps for Splunk Phantom security automation | Cisco Meraki | Ansible Tower | F5 | A10☆25Updated 4 years ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 3 years ago
- Community driven repository of Playbooks and Apps for ThreatConnect.☆70Updated last month
- Templates for Kibana/Logstash to use with Suricata IDPS☆80Updated 9 years ago
- Tool for managing Zeek deployments.☆54Updated last week
- Vulnerability Management tool using the CVE-Search database☆10Updated 8 years ago