FIRSTdotorg / Vuln4CastLinks
A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.
☆44Updated last month
Alternatives and similar repositories for Vuln4Cast
Users that are interested in Vuln4Cast are comparing it to the libraries listed below
Sorting:
- Exploit Prediction Scoring System (EPSS)☆30Updated 3 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆49Updated this week
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated this week
- Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology☆87Updated 3 months ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆37Updated 5 months ago
- Global Security Database Tools☆43Updated last year
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆59Updated 3 months ago
- CVE.ICU code.☆47Updated this week
- ☆28Updated 4 years ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆92Updated last month
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Updated 2 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 4 months ago
- CISA CSAF Security Advisories☆89Updated last week
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆31Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆97Updated 5 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆83Updated this week
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated last year
- Stakeholder-Specific Vulnerability Categorization☆166Updated this week
- This repository holds the necessary content to produce the D3FEND ontology distribution.☆92Updated last week
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆33Updated 3 weeks ago
- AIL project training materials☆37Updated 3 months ago
- Workflows for Shuffle☆24Updated 3 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- Adversary Emulation Planner☆42Updated last year
- Python client and module for Vulnerability-Lookup.☆14Updated 2 weeks ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 3 years ago
- Augmentation to Machine Readable CTI☆37Updated 2 months ago