tesorion / TCERT-Tesorion_Vulnerability_ExplorerLinks
☆15Updated last year
Alternatives and similar repositories for TCERT-Tesorion_Vulnerability_Explorer
Users that are interested in TCERT-Tesorion_Vulnerability_Explorer are comparing it to the libraries listed below
Sorting:
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆111Updated 2 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆29Updated 5 months ago
- ☆30Updated last month
- EPSScall☆11Updated 3 years ago
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- Security Alert Decoration☆27Updated 3 weeks ago
- ☆45Updated 4 months ago
- Short deep dive into Threat Hunting on AWS☆13Updated last year
- Adversary Emulation Planner☆41Updated last year
- Global Security Database Tools☆43Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆114Updated last week
- ☆27Updated last month
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated 6 months ago
- ☆74Updated 4 months ago
- Tool for obfuscating and deobfuscating data.☆72Updated last year
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆45Updated 3 months ago
- ☆10Updated 3 years ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Updated 2 years ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 8 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆71Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 3 years ago
- https://breaches.cloud☆41Updated 9 months ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆23Updated 10 months ago
- ☆46Updated 9 months ago
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP se…☆71Updated 2 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 9 months ago
- Modron - Cloud security compliance☆34Updated 8 months ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆166Updated last year