tesorion / TCERT-Tesorion_Vulnerability_Explorer
☆15Updated last year
Alternatives and similar repositories for TCERT-Tesorion_Vulnerability_Explorer:
Users that are interested in TCERT-Tesorion_Vulnerability_Explorer are comparing it to the libraries listed below
- EPSScall☆10Updated 2 years ago
- ☆29Updated 5 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 6 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 2 months ago
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆18Updated 2 months ago
- Tool for obfuscating and deobfuscating data.☆70Updated last year
- ☆39Updated 5 months ago
- ☆42Updated last month
- Security Alert Decoration☆27Updated this week
- Fun tools around the EBS Direct API☆18Updated 4 years ago
- DefectDojo Community Content☆18Updated 6 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated 11 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 4 months ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Updated 2 years ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆70Updated 2 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated last year
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆68Updated 10 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆55Updated this week
- Adversary Emulation Planner☆39Updated 9 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Updated 7 months ago
- ☆12Updated 5 months ago
- ☆18Updated 3 years ago
- read the docs version of risk management☆25Updated 2 years ago
- Automate vulnerability triage which prioritizes remediation over discovery☆16Updated this week
- ☆73Updated last month
- Remotely collect linux live forensics artifacts.☆14Updated 2 years ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆22Updated 6 months ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated last year