jgamblin / CISA_Enrichment
CISA Known Exploited Vulnerabilities Catalog Enrichment
☆18Updated 10 months ago
Alternatives and similar repositories for CISA_Enrichment
Users that are interested in CISA_Enrichment are comparing it to the libraries listed below
Sorting:
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆51Updated 2 weeks ago
- CVE.ICU code.☆42Updated this week
- Generate portable TTP intelligence from a web-based report☆31Updated 2 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 2 years ago
- ☆28Updated 4 months ago
- Nessus Audit files☆32Updated 2 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- ☆42Updated last year
- Threat Mapping Catalogue☆17Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Useful commands for infosec☆29Updated 2 years ago
- A rogue DNS detector☆23Updated last year
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Updated 10 months ago
- Automatically perform advanced NTLM hash relay attacks☆14Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- ☆14Updated 6 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 7 months ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- A Yara Lua output script for Suricata☆20Updated 6 years ago