hrbrmstr / cisa-known-exploited-vulnsLinks
Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list
☆35Updated this week
Alternatives and similar repositories for cisa-known-exploited-vulns
Users that are interested in cisa-known-exploited-vulns are comparing it to the libraries listed below
Sorting:
- CSIRT Jump Bag☆26Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Updated last year
- A web scraper to create MISP events and reports☆15Updated last month
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Updated 3 months ago
- Automatic detection engineering technical state compliance☆55Updated 11 months ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- Open-source Fabric templates for cybersecurity and compliance☆20Updated 4 months ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- Can you pay the ransom in your country?☆14Updated last year
- List of Awesome Vertex Synapse Resources☆28Updated 10 months ago
- The FASTEST way to consume threat intel.☆68Updated 2 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 6 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆78Updated last week
- A collection of tips for using MISP.☆74Updated 5 months ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Updated 4 years ago
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆38Updated last week
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Setting up a training environment for MISP☆12Updated 2 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 5 months ago
- ☆24Updated last month
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆37Updated 4 years ago
- ☆28Updated 4 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆33Updated last year