tesorion / TCERT-Tesorion_Vulnerability_ExplorerLinks
☆15Updated last year
Alternatives and similar repositories for TCERT-Tesorion_Vulnerability_Explorer
Users that are interested in TCERT-Tesorion_Vulnerability_Explorer are comparing it to the libraries listed below
Sorting:
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 4 months ago
- ☆30Updated last week
- EPSScall☆11Updated 3 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Updated 4 months ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- ☆44Updated 3 months ago
- Open-source Fabric templates for cybersecurity and compliance☆20Updated 5 months ago
- Tool for obfuscating and deobfuscating data.☆70Updated last year
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 8 months ago
- ☆10Updated 3 years ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆20Updated 3 weeks ago
- ☆25Updated 3 months ago
- Adversary Emulation Planner☆39Updated 11 months ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated this week
- DefectDojo Community Content☆18Updated 2 weeks ago
- ☆12Updated last week
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆51Updated last week
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- A meta-database collecting resources that compile lists of breaches☆20Updated 7 months ago
- pocket guide for core detection engineering concepts☆28Updated 2 years ago
- Documentation used for Shuffle☆19Updated this week
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 6 months ago
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- This repository contains generated contextual data utilized by pyattck.☆19Updated 3 months ago
- This is a repository to experiment with MCP for security☆39Updated 5 months ago
- ☆14Updated 2 years ago
- Workflows for Shuffle☆23Updated 2 years ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 7 months ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Updated 2 years ago