hrbrmstr / cisa-known-exploited-vulns
Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list
☆33Updated this week
Alternatives and similar repositories for cisa-known-exploited-vulns:
Users that are interested in cisa-known-exploited-vulns are comparing it to the libraries listed below
- A lab environment for learning about MSTICPy☆37Updated 2 years ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆76Updated 4 months ago
- CSIRT Jump Bag☆26Updated 11 months ago
- Open-source Fabric templates for cybersecurity and compliance☆16Updated 2 months ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- ☆22Updated 10 months ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 2 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- Adversary Emulation Planner☆38Updated 9 months ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆39Updated 11 months ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆77Updated 10 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- ☆63Updated last month
- A web scraper to create MISP events and reports☆14Updated 2 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆35Updated 3 months ago
- A collection of tips for using MISP.☆74Updated 3 months ago
- OSSEM Common Data Model☆55Updated 2 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆37Updated 2 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- DNS Dashboard for hunting and identifying beaconing☆15Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Can you pay the ransom in your country?☆14Updated last year
- ☆87Updated last month
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 5 months ago
- ☆27Updated 4 years ago