Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data
☆66Mar 16, 2026Updated last week
Alternatives and similar repositories for CVElk
Users that are interested in CVElk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆19Jun 24, 2024Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83May 3, 2024Updated last year
- MITRE ATT&CK Based App in Power BI☆18Feb 23, 2024Updated 2 years ago
- ☆15Mar 17, 2026Updated last week
- Labeled vulnerability-package match pairs used as ground truth to evaluate vulnerability scanners☆14Mar 17, 2026Updated last week
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year
- ☆14Nov 21, 2022Updated 3 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆36May 14, 2022Updated 3 years ago
- ☆11Apr 18, 2022Updated 3 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- Notify is a helper utility written in Go that allows you to post output to multiple platforms.☆18May 27, 2022Updated 3 years ago
- NVD API 2.0 for python☆12Sep 26, 2024Updated last year
- ☆102Sep 27, 2024Updated last year
- SigmaHQ pySigma CrowdStrike processing pipeline☆28Nov 30, 2025Updated 3 months ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 5 months ago
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 4 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- Automation with SSH for Hacking☆10Jan 28, 2025Updated last year
- ☆42Dec 13, 2020Updated 5 years ago
- CVE-2024-28995 POC Vulnerability Scanner☆13Jun 15, 2024Updated last year
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- Loads STIX-2 into Neo4j☆26Jul 11, 2020Updated 5 years ago
- Basic raw packet sniffer in Python - Cybrary☆12Nov 21, 2017Updated 8 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆18May 17, 2020Updated 5 years ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- ☆14Nov 8, 2024Updated last year
- An implementation of a Model Context Protocol (MCP) for the Nuclei scanner. This tool enables context-aware vulnerability scanning by int…☆43Aug 4, 2025Updated 7 months ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- CVE.ICU code.☆51Updated this week
- Script to upload files to non-repo storage from the command line☆75Feb 18, 2015Updated 11 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Reverse whois query tool☆11Jul 28, 2016Updated 9 years ago
- Scan and categorize websites for rapid triage☆12Jun 23, 2022Updated 3 years ago
- Collection of templates from various resources☆43Dec 5, 2025Updated 3 months ago