varchashva / vPrioritizerLinks
vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization, for teams to make more informed decision about what (vulnerability/ties) they should remediate (or can afford not to) and on which (asset/s)
☆69Updated this week
Alternatives and similar repositories for vPrioritizer
Users that are interested in vPrioritizer are comparing it to the libraries listed below
Sorting:
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- Virtual Security Operations Center☆51Updated last year
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Nessus Audit files☆33Updated 2 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated 2 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆86Updated 2 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆36Updated 6 years ago
- Shodan Monitoring integration for TheHive.☆130Updated 7 months ago
- Cloud Security Operations Orchestrator☆186Updated last year
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Tool to predict attacker groups from the techniques and software used☆49Updated 3 years ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Windows Security Logging☆43Updated 2 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆68Updated 3 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆106Updated 2 years ago
- Microsoft Azure Exploitation Framework☆57Updated 4 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago