hrbrmstr / cisa-known-exploited-vulns
Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list
☆34Updated this week
Alternatives and similar repositories for cisa-known-exploited-vulns:
Users that are interested in cisa-known-exploited-vulns are comparing it to the libraries listed below
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆77Updated 5 months ago
- CSIRT Jump Bag☆26Updated last year
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆63Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆31Updated last year
- A web scraper to create MISP events and reports☆14Updated last week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆45Updated last week
- Automatic detection engineering technical state compliance☆55Updated 9 months ago
- ☆22Updated last week
- ☆27Updated 4 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- ☆118Updated last year
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- A collection of tips for using MISP.☆74Updated 4 months ago
- The FASTEST way to consume threat intel.☆68Updated last year
- Open-source Fabric templates for cybersecurity and compliance☆17Updated 3 months ago
- misp-guard is a mitmproxy addon that inspects and blocks outgoing events to external MISP instances via sync mechanisms (pull/push) based…☆14Updated 2 months ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- ☆29Updated 4 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated 11 months ago
- ☆58Updated 2 years ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated last year
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 2 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- ☆51Updated 3 years ago
- MITRE Shield website☆19Updated 3 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Adversary Emulation Planner☆39Updated 9 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- DNS Dashboard for hunting and identifying beaconing☆15Updated 4 years ago