cisagov / kev-dataLinks
Mirror of cisa.gov/kev data files
☆58Updated this week
Alternatives and similar repositories for kev-data
Users that are interested in kev-data are comparing it to the libraries listed below
Sorting:
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆211Updated this week
- Anvilogic Forge☆108Updated 3 weeks ago
- ☆163Updated last week
- VulnCheck's official command line tool☆139Updated 2 weeks ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆79Updated last month
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆102Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- ☆50Updated 3 weeks ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆81Updated last year
- pocket guide for core detection engineering concepts☆30Updated 2 years ago
- ☆45Updated 2 months ago
- Stakeholder-Specific Vulnerability Categorization☆164Updated this week
- An index of publicly available and open-source threat detection rulesets.☆125Updated 5 months ago
- ☆119Updated 2 years ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 11 months ago
- boostsecurityio/lotp☆134Updated 5 months ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆28Updated 3 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 10 months ago
- ☆65Updated last year
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆149Updated last week
- ☆72Updated last month
- ☆190Updated 5 months ago
- Open Threat Hunting Framework☆120Updated 2 years ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆180Updated 8 months ago
- Memory Forensic System on Cloud☆91Updated last year
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆31Updated last year
- ☆94Updated last week
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆165Updated last month
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆29Updated 2 years ago