tesorion / TCERT-Tesorion_Vulnerability_ExplorerLinks
☆15Updated last year
Alternatives and similar repositories for TCERT-Tesorion_Vulnerability_Explorer
Users that are interested in TCERT-Tesorion_Vulnerability_Explorer are comparing it to the libraries listed below
Sorting:
- ☆31Updated 3 months ago
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- ☆50Updated 3 weeks ago
- Adversary Emulation Planner☆42Updated last year
- Short deep dive into Threat Hunting on AWS☆14Updated last year
- ☆75Updated 6 months ago
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Updated 7 months ago
- This is a repository to experiment with MCP for security☆43Updated 8 months ago
- Tool for obfuscating and deobfuscating data.☆72Updated last year
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆133Updated 4 months ago
- Global Security Database Tools☆43Updated last year
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆30Updated 2 years ago
- Security Alert Decoration☆27Updated 2 months ago
- ☆28Updated 2 weeks ago
- A catalog of services that can be publicly exposed within different cloud providers.☆15Updated last year
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆32Updated 11 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 10 months ago
- ☆94Updated last week
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆61Updated 3 months ago
- AuditKit - Multi-Cloud Compliance Scanner & Evidence Collection☆170Updated this week
- An LLM and OCR based Indicator of Compromise Extraction Tool☆35Updated 10 months ago
- Add a layer of active defense to your cloud applications.☆95Updated last week
- Rules shared by the community from 100 Days of YARA 2025☆35Updated 8 months ago
- ☆73Updated 3 weeks ago
- ☆47Updated 11 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆71Updated last year
- Fun tools around the EBS Direct API☆19Updated 4 years ago
- Stakeholder-Specific Vulnerability Categorization☆164Updated this week
- PII detection platform, leveraging human-in-the-loop AI☆54Updated 10 months ago