jgamblin / CISA_Enrichment
CISA Known Exploited Vulnerabilities Catalog Enrichment
☆18Updated 7 months ago
Alternatives and similar repositories for CISA_Enrichment:
Users that are interested in CISA_Enrichment are comparing it to the libraries listed below
- CVE.ICU code.☆39Updated this week
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 7 months ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- Generate portable TTP intelligence from a web-based report☆30Updated 2 years ago
- ☆14Updated 6 years ago
- A simple way to exfiltrate data using spotify API☆18Updated last week
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Updated 4 years ago
- CyCAT.org API back-end server including crawlers☆30Updated 2 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- ☆24Updated 2 years ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 4 months ago
- Automatic detection engineering technical state compliance☆54Updated 7 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- ☆41Updated 10 months ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 2 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆25Updated last year
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- An extension of the sigma standard to include security metrics.☆15Updated last year
- ☆22Updated last year
- A mini project to exfiltrate data via QR codes☆19Updated 2 months ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- ☆15Updated 2 years ago
- Monthly CVE Stats☆37Updated 2 weeks ago
- Public repository for Red Canary Research☆37Updated 4 years ago
- certstream + analytics☆10Updated 5 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago