jgamblin / CISA_EnrichmentLinks
CISA Known Exploited Vulnerabilities Catalog Enrichment
☆18Updated last year
Alternatives and similar repositories for CISA_Enrichment
Users that are interested in CISA_Enrichment are comparing it to the libraries listed below
Sorting:
- CVE.ICU code.☆46Updated this week
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 2 months ago
- CveXplore☆43Updated this week
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 7 months ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- Generate portable TTP intelligence from a web-based report☆31Updated 2 years ago
- A mini project to exfiltrate data via QR codes☆19Updated last month
- Monthly CVE Stats☆43Updated 2 weeks ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated 2 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆21Updated last week
- Python client and module for Vulnerability-Lookup.☆12Updated last week
- A Smart Log4Shell/Log4j/CVE-2021-44228 Scanner☆14Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- ☆42Updated 5 months ago
- Automatic detection engineering technical state compliance☆55Updated last year
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆35Updated 2 months ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 4 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 10 months ago
- Notify is a helper utility written in Go that allows you to post output to multiple platforms.☆16Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆30Updated 2 years ago
- ☆25Updated 2 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆27Updated 2 years ago