varchashva / vPrioritizer
vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization, for teams to make more informed decision about what (vulnerability/ties) they should remediate (or can afford not to) and on which (asset/s)
☆68Updated 3 years ago
Alternatives and similar repositories for vPrioritizer:
Users that are interested in vPrioritizer are comparing it to the libraries listed below
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- ☆41Updated 11 months ago
- ☆41Updated 2 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆37Updated 3 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- Simulating Adversary Operations☆93Updated 6 years ago
- Nessus Audit files☆31Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated 11 months ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- ☆28Updated 2 months ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆34Updated 4 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆48Updated 2 years ago
- Carbon Black Response IR tool☆53Updated 4 years ago
- ☆21Updated last year
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆76Updated 2 years ago
- A forensic evidence acquirer☆86Updated 3 years ago
- ☆78Updated 4 years ago
- Kerberoast Detection Script☆30Updated 4 months ago
- Simulates a compromise in a cloud and container environment☆32Updated 2 months ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 4 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 2 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆102Updated 2 years ago