Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threat information, gain a competitive advantage, and stay informed about the latest trends.
☆691Jan 6, 2026Updated last month
Alternatives and similar repositories for CVE_Prioritizer
Users that are interested in CVE_Prioritizer are comparing it to the libraries listed below
Sorting:
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆216Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83May 3, 2024Updated last year
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,372Updated this week
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 3 months ago
- Stakeholder-Specific Vulnerability Categorization☆175Updated this week
- A repo to conduct vulnerability enrichment.☆733Updated this week
- The useful exploit finder☆826Jan 19, 2026Updated last month
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,205Dec 29, 2025Updated 2 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,302Updated this week
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆719Nov 14, 2025Updated 3 months ago
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆23Jan 21, 2026Updated last month
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆756Feb 1, 2026Updated last month
- Pen Test Report Generation and Assessment Collaboration☆590Feb 22, 2026Updated last week
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆2,139Feb 21, 2026Updated last week
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,927Jan 20, 2026Updated last month
- Detect Tactics, Techniques & Combat Threats☆2,264Jan 21, 2026Updated last month
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆986Dec 28, 2025Updated 2 months ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,547Jan 20, 2026Updated last month
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,208Feb 20, 2026Updated last week
- ☆120May 26, 2025Updated 9 months ago
- Your Everyday Threat Intelligence☆1,951Feb 12, 2026Updated 2 weeks ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆471Feb 23, 2026Updated last week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆463Mar 28, 2024Updated last year
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆240Apr 3, 2024Updated last year
- Open Adversarial Exposure Validation Platform☆1,629Feb 24, 2026Updated last week
- An offensive data enrichment pipeline☆919Updated this week
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,475Dec 31, 2025Updated 2 months ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,199Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆773Jan 28, 2025Updated last year
- Open Cyber Threat Intelligence Platform☆8,893Updated this week
- God Mode Detection Rules☆133Aug 8, 2024Updated last year
- Open source templates you can use to bootstrap your security programs☆890Dec 28, 2025Updated 2 months ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,402Nov 7, 2024Updated last year
- Open Source Vulnerability Management Platform☆6,266Feb 13, 2026Updated 2 weeks ago
- A knowledge base of actionable Incident Response techniques☆662May 31, 2022Updated 3 years ago
- Transform Linux Audit logs for SIEM usage☆815Updated this week
- IntelOwl: manage your Threat Intelligence at scale☆4,467Updated this week
- Mapping of open-source detection rules and atomic tests.☆201Feb 16, 2026Updated 2 weeks ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,344Feb 19, 2026Updated last week