jgamblin / CISA_EnrichmentLinks
CISA Known Exploited Vulnerabilities Catalog Enrichment
☆18Updated last year
Alternatives and similar repositories for CISA_Enrichment
Users that are interested in CISA_Enrichment are comparing it to the libraries listed below
Sorting:
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 3 months ago
- CVE.ICU code.☆46Updated last week
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆76Updated last year
- Monthly CVE Stats☆43Updated last week
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆78Updated 2 years ago
- Generate portable TTP intelligence from a web-based report☆31Updated 2 years ago
- A Smart Log4Shell/Log4j/CVE-2021-44228 Scanner☆14Updated 3 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆21Updated last week
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 8 months ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Updated 6 months ago
- ☆43Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- CveXplore☆42Updated 3 weeks ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- ☆44Updated 2 months ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated this week
- pypykats in your browser☆55Updated 6 years ago
- A set of scripts and analysis commands to harvest Tweets and identify content of interest, meaningful search criteria, and value keywords…☆21Updated 5 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- ☆15Updated 3 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20Updated 4 months ago
- Digital Forensics XML packages in Python☆17Updated 6 months ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 10 months ago
- Suricata rule and intel index☆32Updated 3 weeks ago
- Visual Studio Code extension for MITRE ATT&CK☆54Updated last year
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago