jgamblin / CISA_EnrichmentLinks
CISA Known Exploited Vulnerabilities Catalog Enrichment
☆18Updated last year
Alternatives and similar repositories for CISA_Enrichment
Users that are interested in CISA_Enrichment are comparing it to the libraries listed below
Sorting:
- CVE.ICU code.☆42Updated this week
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆51Updated last week
- Threat Mapping Catalogue☆17Updated 3 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- Generate portable TTP intelligence from a web-based report☆31Updated 2 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- ATLAS - Malware Analysis Description☆21Updated 2 years ago
- Windows Security Logging☆43Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- An extension of the sigma standard to include security metrics.☆15Updated 2 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 3 years ago
- Automatic detection engineering technical state compliance☆55Updated 11 months ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Public repository for Red Canary Research☆37Updated 4 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- ☆43Updated 2 years ago
- Nessus Audit files☆33Updated 2 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆66Updated 3 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆19Updated 2 weeks ago