MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU
☆118Mar 27, 2026Updated 2 weeks ago
Alternatives and similar repositories for MonarcAppFO
Users that are interested in MonarcAppFO are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Incident Notification Platform by @NC3-LU☆11Updated this week
- A Python client for the Global CVE Allocation System.☆17Mar 26, 2026Updated 2 weeks ago
- A collaborative platform for creating, editing and sharing JSON objects.☆75Jan 22, 2026Updated 2 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- Speed up your pentest enumeration☆83Oct 5, 2025Updated 6 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆105Jun 14, 2021Updated 4 years ago
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 3 years ago
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Updated this week
- An open source software directory and release tracker.☆25Updated this week
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 4 years ago
- This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engage…☆56Dec 21, 2025Updated 3 months ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Sep 7, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆25Updated this week
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 7 months ago
- A tool to monitor for potential spear phishing domains and send to Slack.☆23Feb 8, 2024Updated 2 years ago
- A HIDS (host-based intrusion detection system) for verifying the integrity of a system.☆60Apr 1, 2026Updated last week
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Protect your data in minutes !☆125Nov 5, 2024Updated last year
- ☆14May 30, 2018Updated 7 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆35Jan 8, 2026Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Powershell script to generate DMARC reports. Script pulls data from the mailbox and parses this into a onpremises GEO enabled HTML report…☆26Feb 7, 2022Updated 4 years ago
- ⚖Open Source Toolkit for Quantitative Risk Assessment☆183Dec 21, 2022Updated 3 years ago
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆344Updated this week
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated last month
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆28Mar 8, 2023Updated 3 years ago
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆19Feb 16, 2018Updated 8 years ago
- USB Scanning device☆34Sep 16, 2025Updated 6 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- AIL project training materials☆39Feb 24, 2026Updated last month
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- ☆17Nov 3, 2017Updated 8 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆70Nov 11, 2023Updated 2 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆20Mar 30, 2026Updated last week
- In this article i've listed a collection of cheatsheets for digital forensics. It covering forensics topics for smartphone , memory , net…☆13Mar 8, 2020Updated 6 years ago