cisagov / kev-dataLinks
Mirror of cisa.gov/kev data files
☆54Updated this week
Alternatives and similar repositories for kev-data
Users that are interested in kev-data are comparing it to the libraries listed below
Sorting:
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week
- VulnCheck's official command line tool☆138Updated this week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆77Updated 2 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆100Updated last year
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 10 months ago
- Anvilogic Forge☆106Updated 2 weeks ago
- pocket guide for core detection engineering concepts☆30Updated 2 years ago
- ☆144Updated last week
- An index of publicly available and open-source threat detection rulesets.☆122Updated 4 months ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆76Updated last year
- ☆47Updated 5 months ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆164Updated 2 months ago
- boostsecurityio/lotp☆132Updated 4 months ago
- NOVA: The Prompt Pattern Matching☆161Updated last month
- ☆146Updated 2 months ago
- ☆44Updated 3 weeks ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 9 months ago
- ☆189Updated 4 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆104Updated last year
- Stakeholder-Specific Vulnerability Categorization☆160Updated this week
- ☆30Updated 2 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- ☆41Updated 8 months ago
- ☆94Updated 2 weeks ago
- ☆45Updated last week
- ☆17Updated 2 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 7 months ago
- ☆74Updated 5 months ago