varchashva / vPrioritizerLinks
vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization, for teams to make more informed decision about what (vulnerability/ties) they should remediate (or can afford not to) and on which (asset/s)
☆68Updated 3 years ago
Alternatives and similar repositories for vPrioritizer
Users that are interested in vPrioritizer are comparing it to the libraries listed below
Sorting:
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- Simulates a compromise in a cloud and container environment☆32Updated 5 months ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Virtual Security Operations Center☆50Updated last year
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 6 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- Tool to discover external and internal network attack surface☆198Updated last year
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆93Updated 5 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆33Updated 7 years ago
- ☆21Updated 2 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 4 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated last month
- ☆80Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- ☆50Updated 2 years ago
- ☆43Updated 2 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆100Updated 6 years ago
- ☆47Updated 4 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆51Updated last month
- Nessus Audit files☆32Updated 2 years ago
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆181Updated 2 weeks ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- Windows Security Logging☆43Updated 2 years ago