brandon-t-elliott / cve2epssLinks
A simple web app to get the latest EPSS data for a CVE ID
☆11Updated 2 months ago
Alternatives and similar repositories for cve2epss
Users that are interested in cve2epss are comparing it to the libraries listed below
Sorting:
- ☆16Updated 2 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆33Updated last month
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 8 months ago
- Autonomous AI C2☆31Updated 11 months ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- ☆39Updated 2 weeks ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated 10 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆27Updated this week
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆27Updated 3 months ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 5 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆32Updated this week
- ☆56Updated 3 weeks ago
- Manage attack surface data on Elasticsearch☆22Updated last year
- Claude MCP server to perform analysis on ROADrecon data☆41Updated 2 months ago
- ☆77Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 8 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 3 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated 8 months ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆49Updated last month
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 9 months ago
- Vast.ai Password Kracking☆69Updated last week
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated 8 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆52Updated 4 months ago
- ☆79Updated last month
- ☆47Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆40Updated 2 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆29Updated 2 months ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆12Updated 5 months ago