MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU
☆120Apr 24, 2026Updated last week
Alternatives and similar repositories for MonarcAppFO
Users that are interested in MonarcAppFO are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Incident Notification Platform by @NC3-LU☆11Updated this week
- A collaborative platform for creating, editing and sharing JSON objects.☆74Apr 22, 2026Updated last week
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- Speed up your pentest enumeration☆83Oct 5, 2025Updated 6 months ago
- ☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆105Jun 14, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 3 years ago
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Apr 21, 2026Updated last week
- An open source software directory and release tracker.☆25Apr 21, 2026Updated last week
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 9 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 4 years ago
- This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engage…☆56Dec 21, 2025Updated 4 months ago
- Protean is a collection of transformers designed for the purpose of obfuscating UDP network traffic☆16Dec 4, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Sep 7, 2021Updated 4 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆25Updated this week
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 8 months ago
- This Risk Rating Calculator is based on OWASP's Risk Rating Methodology☆22May 19, 2024Updated last year
- A tool to monitor for potential spear phishing domains and send to Slack.☆23Feb 8, 2024Updated 2 years ago
- A HIDS (host-based intrusion detection system) for verifying the integrity of a system.☆59Apr 1, 2026Updated 3 weeks ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- ☆14May 30, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Identify the accounts most vulnerable to dictionary attacks☆121Apr 2, 2025Updated last year
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Powershell script to generate DMARC reports. Script pulls data from the mailbox and parses this into a onpremises GEO enabled HTML report…☆26Feb 7, 2022Updated 4 years ago
- Mapping the information system / Cartographie du système d'information☆506Updated this week
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆36Jan 8, 2026Updated 3 months ago
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆348Apr 23, 2026Updated last week
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated 2 months ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆29Mar 8, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆19Feb 16, 2018Updated 8 years ago
- USB Scanning device☆34Apr 15, 2026Updated 2 weeks ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- AIL project training materials☆39Apr 21, 2026Updated last week
- ☆17Nov 3, 2017Updated 8 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆20Apr 8, 2026Updated 3 weeks ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago