usnistgov / BFLinks
Bugs Framework
☆8Updated 2 months ago
Alternatives and similar repositories for BF
Users that are interested in BF are comparing it to the libraries listed below
Sorting:
- ☆15Updated 7 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- A tool for detecting sensitive data in code repositories☆16Updated last month
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 4 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Updated last year
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- Vulnerability Management tool using the CVE-Search database☆10Updated 9 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Updated 3 months ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- The OVAL Language Sandbox☆44Updated 4 years ago
- ThreatWorx Information Gathering Script (twigs) to discover assets like hosts, cloud instances, containers and repositories of projects.☆12Updated last week
- A mapping project between tags (annotations, labels) and domain names☆11Updated last year
- Setting up a training environment for MISP☆12Updated 2 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated last year
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- Exploit, Malware and Vulnerability Scoring Application☆13Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 8 months ago
- Development of the NIST vulnerability data ontology (Vulntology).☆39Updated last month
- Create machine images containing the Nessus vulnerability scanner☆13Updated 2 weeks ago
- A curated threat modeling library collection☆22Updated last year
- New version of the buildkit repository☆9Updated 3 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Updated 4 years ago
- A CALDERA plugin☆13Updated last year
- A curated list of Cloud Security techniques and tools☆29Updated 2 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 9 years ago
- S3Insights is a platform for efficiently deriving security insights about S3 data through metadata analysis☆12Updated last month