jgamblin / CVEHeatMapLinks
A CVE Heatmap Using CalPlot
☆97Updated 4 years ago
Alternatives and similar repositories for CVEHeatMap
Users that are interested in CVEHeatMap are comparing it to the libraries listed below
Sorting:
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Updated 5 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated 2 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- ☆100Updated 4 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- For storing of the volumes☆4Updated 5 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆42Updated 4 years ago
- Automatically exported from code.google.com/p/nipper-ng☆70Updated 3 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 3 years ago
- Website crawler with YARA detection☆88Updated last year
- Extract indicators of compromise from text, including "escaped" ones.☆160Updated 5 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Nmap Script to scan for Winnti infections☆70Updated 7 years ago
- Test a host for susceptibility to CVE-2019-19781☆108Updated 4 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated last week
- Scripts that we use for pentesting☆42Updated 8 years ago
- Simulating Adversary Operations☆93Updated 7 years ago
- Cloud Security Operations Orchestrator☆186Updated last year
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- A Passive SSH back-end and scanner.☆103Updated last month
- Open source tools, libraries, and datasets related to the runZero product and associated research☆119Updated 3 months ago
- A framework to generate unique test cases based on code snippets to test techniques☆55Updated 4 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆100Updated 4 years ago