MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU
☆119Mar 6, 2026Updated 2 weeks ago
Alternatives and similar repositories for MonarcAppFO
Users that are interested in MonarcAppFO are comparing it to the libraries listed below
Sorting:
- Incident Notification Platform by @NC3-LU☆11Updated this week
- A collaborative platform for creating, editing and sharing JSON objects.☆75Jan 22, 2026Updated 2 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- Speed up your pentest enumeration☆82Oct 5, 2025Updated 5 months ago
- ☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆104Jun 14, 2021Updated 4 years ago
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 2 years ago
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Updated this week
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆23Updated this week
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 4 years ago
- This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engage…☆53Dec 21, 2025Updated 3 months ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 7 months ago
- A tool to monitor for potential spear phishing domains and send to Slack.☆23Feb 8, 2024Updated 2 years ago
- A HIDS (host-based intrusion detection system) for verifying the integrity of a system.☆60Feb 4, 2026Updated last month
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Protect your data in minutes !☆125Nov 5, 2024Updated last year
- ☆14May 30, 2018Updated 7 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆35Jan 8, 2026Updated 2 months ago
- Identify the accounts most vulnerable to dictionary attacks☆121Apr 2, 2025Updated 11 months ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Powershell script to generate DMARC reports. Script pulls data from the mailbox and parses this into a onpremises GEO enabled HTML report…☆28Feb 7, 2022Updated 4 years ago
- Mapping the information system / Cartographie du système d'information☆500Updated this week
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆338Updated this week
- ⚖Open Source Toolkit for Quantitative Risk Assessment☆182Dec 21, 2022Updated 3 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated 3 weeks ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆28Mar 8, 2023Updated 3 years ago
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆19Feb 16, 2018Updated 8 years ago
- USB Scanning device☆33Sep 16, 2025Updated 6 months ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- AIL project training materials☆39Feb 24, 2026Updated 3 weeks ago
- ☆17Nov 3, 2017Updated 8 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Nov 11, 2023Updated 2 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆19Updated this week
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Oct 19, 2013Updated 12 years ago