tesorion / TCERT-Tesorion_Vulnerability_ExplorerLinks
☆15Updated last year
Alternatives and similar repositories for TCERT-Tesorion_Vulnerability_Explorer
Users that are interested in TCERT-Tesorion_Vulnerability_Explorer are comparing it to the libraries listed below
Sorting:
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Updated 9 months ago
- Posture Attribute Collection and Evaluation☆24Updated 2 years ago
- Adversary Emulation Planner☆42Updated last year
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- ☆51Updated 2 months ago
- ☆31Updated 5 months ago
- Tool for obfuscating and deobfuscating data.☆75Updated last year
- EPSScall☆11Updated 3 years ago
- Security Alert Decoration☆27Updated 4 months ago
- Short deep dive into Threat Hunting on AWS☆14Updated 2 years ago
- Global Security Database Tools☆43Updated last year
- Fun tools around the EBS Direct API☆19Updated 4 years ago
- ☆98Updated 2 weeks ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆53Updated last year
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆25Updated last year
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆133Updated 5 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated 9 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆117Updated 2 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- ☆10Updated 3 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Updated 3 years ago
- Stakeholder-Specific Vulnerability Categorization☆166Updated this week
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆36Updated last year
- Add a layer of active defense to your cloud applications.☆97Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- ☆75Updated 8 months ago
- ☆28Updated last week
- A library of data visualization dashboard templates that can be imported into JupiterOne.☆18Updated this week
- ☆47Updated last year
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆64Updated 4 months ago