jgamblin / CISA_EnrichmentLinks
CISA Known Exploited Vulnerabilities Catalog Enrichment
☆18Updated last year
Alternatives and similar repositories for CISA_Enrichment
Users that are interested in CISA_Enrichment are comparing it to the libraries listed below
Sorting:
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 4 months ago
- CVE.ICU code.☆47Updated this week
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated 2 years ago
- Generate portable TTP intelligence from a web-based report☆31Updated 3 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated last month
- CveXplore☆42Updated 2 months ago
- A Smart Log4Shell/Log4j/CVE-2021-44228 Scanner☆14Updated 3 years ago
- Monthly CVE Stats☆43Updated 2 weeks ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- Digital Forensics XML packages in Python☆17Updated 7 months ago
- Cybersecurity Incidents Mind Maps☆34Updated 4 years ago
- Generic Signature Format for SIEM Systems☆14Updated 4 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 11 months ago
- ☆15Updated 3 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- Threat Mapping Catalogue☆18Updated 4 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 9 months ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆21Updated last month
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆28Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- ☆44Updated 2 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆37Updated 5 months ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- Global Security Database Tools☆43Updated last year