varchashva / vPrioritizerLinks
vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization, for teams to make more informed decision about what (vulnerability/ties) they should remediate (or can afford not to) and on which (asset/s)
☆69Updated 5 months ago
Alternatives and similar repositories for vPrioritizer
Users that are interested in vPrioritizer are comparing it to the libraries listed below
Sorting:
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆67Updated 4 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆102Updated 7 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Virtual Security Operations Center☆52Updated 2 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated 2 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆51Updated 2 years ago
- Automatically exported from code.google.com/p/nipper-ng☆72Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆165Updated last week
- Security Assessment Report geNerated Automatically☆41Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- Cloud Security Operations Orchestrator☆188Updated last year
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- Shodan Monitoring integration for TheHive.☆131Updated last year
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Updated 3 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆94Updated 2 years ago
- automated password spraying tool☆147Updated 4 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆116Updated 5 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 8 months ago
- Tool to predict attacker groups from the techniques and software used☆50Updated 4 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Updated 2 years ago
- Parse .nessus file(s) and shows output in interactive UI☆161Updated last week
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- ☆51Updated 3 years ago
- Tool used to perform threat intelligence against packet data☆36Updated 11 months ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 8 years ago
- Simulating Adversary Operations☆96Updated 7 years ago
- nse script to inject jndi payloads☆45Updated 4 years ago