TURROKS / CVE_Prioritizer
Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threat information, gain a competitive advantage, and stay informed about the latest trends.
☆627Updated 2 weeks ago
Alternatives and similar repositories for CVE_Prioritizer:
Users that are interested in CVE_Prioritizer are comparing it to the libraries listed below
- A repo to conduct vulnerability enrichment.☆610Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆663Updated 2 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,102Updated last week
- Open Breach and Attack Simulation & Security Validation Platform☆990Updated this week
- Open source templates you can use to bootstrap your security programs☆837Updated 2 weeks ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆656Updated this week
- Pen Test Report Generation and Assessment Collaboration☆512Updated 3 weeks ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆193Updated this week
- Incident Response Methodologies 2022☆1,045Updated last week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆242Updated this week
- Halberd : Multi-Cloud Attack Platform☆266Updated this week
- MITRE Caldera™ for OT Plugins & Capabilities☆207Updated 4 months ago
- ☆258Updated 4 months ago
- A curated list of annual cyber security reports☆501Updated last week
- This is a Project Designed for Security Analysts and all SOC audiences who wants to play with implementation and explore the Modern SOC a…☆665Updated 6 months ago
- Documentation and scripts to properly enable Windows event logs.☆601Updated last year
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆694Updated last month
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆388Updated this week
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆397Updated last year
- Purple Team Exercise Framework☆693Updated last year
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆600Updated 3 weeks ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆234Updated 3 weeks ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,176Updated 2 weeks ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆629Updated 10 months ago
- SOCFortress CoPilot☆268Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆277Updated last week
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆428Updated last month
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆857Updated 7 months ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆718Updated 3 weeks ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,784Updated last week