varchashva / vPrioritizerLinks
vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization, for teams to make more informed decision about what (vulnerability/ties) they should remediate (or can afford not to) and on which (asset/s)
☆69Updated 6 months ago
Alternatives and similar repositories for vPrioritizer
Users that are interested in vPrioritizer are comparing it to the libraries listed below
Sorting:
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆52Updated 3 years ago
- Cloud Security Operations Orchestrator☆188Updated last year
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆166Updated last week
- Shodan Monitoring integration for TheHive.☆130Updated last year
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 4 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 4 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated 2 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- ☆51Updated 3 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Updated 3 years ago
- Virtual Security Operations Center☆52Updated 2 years ago
- Automatically exported from code.google.com/p/nipper-ng☆73Updated 3 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- A forensic evidence acquirer☆86Updated 4 years ago
- automated password spraying tool☆148Updated 4 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆80Updated 3 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆156Updated last year
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- Tool to discover external and internal network attack surface☆203Updated last year
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- Tool used to perform threat intelligence against packet data☆36Updated last year
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆94Updated 2 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 4 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 9 months ago
- Parse .nessus file(s) and shows output in interactive UI☆163Updated 3 weeks ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago