varchashva / vPrioritizerLinks
vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization, for teams to make more informed decision about what (vulnerability/ties) they should remediate (or can afford not to) and on which (asset/s)
☆68Updated 3 years ago
Alternatives and similar repositories for vPrioritizer
Users that are interested in vPrioritizer are comparing it to the libraries listed below
Sorting:
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- ☆80Updated 2 years ago
- A forensic evidence acquirer☆86Updated 4 years ago
- Security Assessment Report geNerated Automatically☆41Updated 8 months ago
- Tool to discover external and internal network attack surface☆198Updated last year
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- Virtual Security Operations Center☆50Updated last year
- ☆69Updated 3 years ago
- Nessus Audit files☆33Updated 2 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆31Updated 2 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆60Updated 3 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆67Updated 2 months ago
- Carbon Black Response IR tool☆53Updated 4 years ago
- Automatically exported from code.google.com/p/nipper-ng☆70Updated 2 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- Simulating Adversary Operations☆93Updated 7 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆100Updated 6 years ago
- Sharing Threat Hunting runbooks☆26Updated 5 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- Simulates a compromise in a cloud and container environment☆32Updated 6 months ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Fast offline auditing of Active Directory passwords using Python.☆163Updated 10 months ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- Tool to predict attacker groups from the techniques and software used☆49Updated 3 years ago