☆44Oct 16, 2025Updated 5 months ago
Alternatives and similar repositories for cloud-vulnerabilities
Users that are interested in cloud-vulnerabilities are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jun 20, 2022Updated 3 years ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Aug 24, 2022Updated 3 years ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- ☆50Updated this week
- ☆17Sep 2, 2021Updated 4 years ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 3 months ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- Systematic Universal Security Testing Orchestration☆37Mar 28, 2022Updated 3 years ago
- Official Website Of The Sigma Project☆23Feb 16, 2026Updated last month
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- https://breaches.cloud☆42Oct 16, 2024Updated last year
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Security Intelligence Automation Platform☆22Feb 3, 2026Updated last month
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated last month
- A few transforms and a machine for parsing Nmap XML results☆38Jun 12, 2016Updated 9 years ago
- Best prompt usecase for Top App/Website Builder☆26Aug 30, 2025Updated 6 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆110Jan 16, 2024Updated 2 years ago
- DEPRECATED: Docker support moved to https://github.com/owtf/owtf☆34Feb 15, 2026Updated last month
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- KQL Queries☆34Feb 17, 2026Updated last month
- ☆11Apr 22, 2022Updated 3 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Aug 25, 2022Updated 3 years ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- The CIA Compliance Manager is an application that helps organizations assess and manage the availability, integrity, and confidentiality …☆15Mar 16, 2026Updated last week
- ☆10Nov 8, 2021Updated 4 years ago
- Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.☆11Jan 7, 2023Updated 3 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆380Sep 19, 2025Updated 6 months ago
- Data about all known supply-chain attacks through history☆64May 28, 2025Updated 9 months ago
- ☆29Aug 12, 2021Updated 4 years ago
- Azure function to insert MISP data in to Azure Sentinel☆34Oct 19, 2022Updated 3 years ago
- KEV EPSS Data☆31Updated this week
- Yellow Server☆12Jun 11, 2025Updated 9 months ago
- ☆63Oct 29, 2024Updated last year
- DFIR Timeline Analysis for macOS — SQLite-backed viewer for CSV, TSV, XLSX, EVTX, Plaso, $MFT, and $J files with built-in process inspect…☆213Updated this week
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago