tesorion / TCERT-Tesorion_Vulnerability_Explorer
☆13Updated last year
Alternatives and similar repositories for TCERT-Tesorion_Vulnerability_Explorer:
Users that are interested in TCERT-Tesorion_Vulnerability_Explorer are comparing it to the libraries listed below
- Security Alert Decoration☆26Updated this week
- Knowledge Report Alert & Normalization Generator☆27Updated 10 months ago
- Fun tools around the EBS Direct API☆18Updated 3 years ago
- ☆39Updated 2 weeks ago
- EPSScall☆12Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- ☆31Updated 2 months ago
- Adversary Emulation Planner☆38Updated 7 months ago
- ☆26Updated 2 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated 11 months ago
- ☆12Updated 2 months ago
- This repository contains generated contextual data utilized by pyattck.☆18Updated 6 months ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆16Updated last year
- Remotely collect linux live forensics artifacts.☆13Updated 2 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆37Updated 3 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 2 months ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆18Updated 5 months ago
- Subscriptions to collect Windows Event Logs mapped to the MITRE ATT&CK model☆12Updated 4 years ago
- pocket guide for core detection engineering concepts☆27Updated last year
- A modern CLI for Tenable.io written in Go☆14Updated 4 years ago
- Workflows for Shuffle☆21Updated 2 years ago
- ☆18Updated 3 years ago
- Documentation used for Shuffle☆19Updated this week
- Tool for obfuscating and deobfuscating data.☆67Updated 10 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆13Updated 11 months ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆31Updated 8 months ago
- CyCAT.org API back-end server including crawlers☆30Updated last year
- read the docs version of risk management☆24Updated last year