tesorion / TCERT-Tesorion_Vulnerability_ExplorerLinks
☆15Updated last year
Alternatives and similar repositories for TCERT-Tesorion_Vulnerability_Explorer
Users that are interested in TCERT-Tesorion_Vulnerability_Explorer are comparing it to the libraries listed below
Sorting:
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- ☆31Updated 4 months ago
- Posture Attribute Collection and Evaluation☆24Updated 2 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Updated 8 months ago
- ☆50Updated last month
- Security Alert Decoration☆27Updated 3 months ago
- Tool for obfuscating and deobfuscating data.☆74Updated last year
- Modron - Cloud security compliance☆34Updated 10 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆36Updated last year
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆133Updated 4 months ago
- pocket guide for core detection engineering concepts☆30Updated 2 years ago
- Adversary Emulation Planner☆42Updated last year
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- ☆75Updated 7 months ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆30Updated 2 years ago
- Fun tools around the EBS Direct API☆19Updated 4 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆28Updated 4 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 11 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Updated 5 months ago
- Short deep dive into Threat Hunting on AWS☆14Updated 2 years ago
- Global Security Database Tools☆43Updated last year
- ☆14Updated 4 months ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆53Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆116Updated last month
- ☆47Updated 11 months ago
- Add a layer of active defense to your cloud applications.☆95Updated this week
- ☆97Updated 2 weeks ago
- A library of data visualization dashboard templates that can be imported into JupiterOne.☆18Updated last month
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆24Updated last year
- ☆28Updated last month