jgamblin / CISA_EnrichmentLinks
CISA Known Exploited Vulnerabilities Catalog Enrichment
☆18Updated last year
Alternatives and similar repositories for CISA_Enrichment
Users that are interested in CISA_Enrichment are comparing it to the libraries listed below
Sorting:
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated last month
- CVE.ICU code.☆43Updated this week
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- A Smart Log4Shell/Log4j/CVE-2021-44228 Scanner☆14Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- Suricata rule and intel index☆31Updated last week
- Monthly CVE Stats☆43Updated 2 weeks ago
- Generate portable TTP intelligence from a web-based report☆31Updated 2 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆20Updated 3 weeks ago
- ☆43Updated 2 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- ☆42Updated last week
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Updated 3 months ago
- ☆42Updated 3 months ago
- CveXplore☆40Updated 2 weeks ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- Automatic detection engineering technical state compliance☆55Updated last year
- certstream + analytics☆11Updated 5 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆35Updated last month
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- ☆24Updated 2 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago