leonov-av / vulristics
Extensible framework for analyzing publicly available information about vulnerabilities
☆110Updated last week
Alternatives and similar repositories for vulristics:
Users that are interested in vulristics are comparing it to the libraries listed below
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆73Updated 10 months ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 8 months ago
- A CALDERA plugin☆26Updated 8 months ago
- Convert Sigma rules to Wazuh rules☆64Updated 11 months ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆84Updated 3 months ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆30Updated 3 weeks ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆117Updated 3 weeks ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- A MITRE Caldera plugin☆42Updated 4 months ago
- Tool to discover external and internal network attack surface☆195Updated 10 months ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 11 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆56Updated 3 weeks ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated 2 weeks ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 5 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆85Updated last year
- Tool to guess CPE name based on common software name☆92Updated 4 months ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆163Updated last year
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated last week
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆34Updated 7 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆62Updated last year
- Kaze's openly available CVE vulnerability data.☆13Updated last year
- Open Threat Hunting Framework☆112Updated last year
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 6 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆55Updated 3 years ago
- ☆31Updated 3 weeks ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆61Updated 11 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆187Updated this week
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆100Updated last year
- Enterprise Response Model & Common Knowledge☆36Updated 9 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year