cisagov / kev-dataLinks
Mirror of cisa.gov/kev data files
☆56Updated last week
Alternatives and similar repositories for kev-data
Users that are interested in kev-data are comparing it to the libraries listed below
Sorting:
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- ☆164Updated this week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆78Updated 2 weeks ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆102Updated last year
- Anvilogic Forge☆107Updated this week
- pocket guide for core detection engineering concepts☆30Updated 2 years ago
- VulnCheck's official command line tool☆139Updated 3 weeks ago
- ☆146Updated this week
- An index of publicly available and open-source threat detection rulesets.☆124Updated 5 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆27Updated 2 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆104Updated last year
- ☆44Updated last month
- ☆92Updated this week
- ☆47Updated last week
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆178Updated 7 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 10 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆147Updated last week
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆29Updated last year
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆117Updated 11 months ago
- Stakeholder-Specific Vulnerability Categorization☆164Updated this week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 8 months ago
- ☆119Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆165Updated last week
- Memory Forensic System on Cloud☆91Updated last year
- ☆96Updated last month
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆35Updated 9 months ago