varchashva / vPrioritizer
vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization, for teams to make more informed decision about what (vulnerability/ties) they should remediate (or can afford not to) and on which (asset/s)
☆69Updated 2 years ago
Related projects: ⓘ
- ☆78Updated last year
- ☆25Updated this week
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆74Updated 10 months ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆63Updated 4 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 4 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆59Updated 5 months ago
- ☆40Updated 5 months ago
- ☆56Updated this week
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated last year
- ☆20Updated this week
- ☆43Updated last year
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆83Updated last year
- nse script to inject jndi payloads☆45Updated 2 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆36Updated 6 months ago
- ☆27Updated last week
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆94Updated last year
- Carbon Black Response IR tool☆53Updated 3 years ago
- Tool to discover external and internal network attack surface☆188Updated 3 months ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆93Updated 5 years ago
- Linux Incident Response☆89Updated 4 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆102Updated last year
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆32Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆107Updated 2 years ago
- Virtual Security Operations Center☆49Updated last year
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆37Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆74Updated 2 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Simulating Adversary Operations☆93Updated 6 years ago
- A CALDERA plugin for autonomous incident response☆23Updated 7 months ago