cisagov / vulnrichmentLinks
A repo to conduct vulnerability enrichment.
☆646Updated this week
Alternatives and similar repositories for vulnrichment
Users that are interested in vulnrichment are comparing it to the libraries listed below
Sorting:
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆318Updated this week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆650Updated 2 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,161Updated 3 weeks ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆204Updated this week
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆314Updated this week
- Open source templates you can use to bootstrap your security programs☆854Updated 3 weeks ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆656Updated 3 weeks ago
- ☆368Updated last year
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆211Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆689Updated 4 months ago
- Open Adversary Exposure Validation Platform☆1,051Updated this week
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).☆382Updated 2 weeks ago
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆161Updated this week
- BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generato…☆380Updated last week
- Microsoft ICSpector (ICS Forensics Tools framework) is an open-source forensics framework that enables the analysis of Industrial PLC met…☆344Updated 7 months ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,182Updated this week
- A python module for working with ATT&CK☆562Updated 2 weeks ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆77Updated last year
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆347Updated 3 weeks ago
- Hourly updated database of exploit and exploitation reports☆254Updated 5 months ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆996Updated 2 months ago
- Stakeholder-Specific Vulnerability Categorization☆153Updated this week
- Global Security Database☆319Updated last year
- CISA CSAF Security Advisories☆74Updated this week
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆498Updated last month
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆279Updated last year
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆752Updated this week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆185Updated 9 months ago
- 💀 Don't fear the Reaper 👻☆543Updated last week
- OSV-SCALIBR: A library for Software Composition Analysis☆349Updated this week