leonov-av / vulristics
Extensible framework for analyzing publicly available information about vulnerabilities
☆112Updated 3 weeks ago
Alternatives and similar repositories for vulristics:
Users that are interested in vulristics are comparing it to the libraries listed below
- A repository with data about APTs☆12Updated 2 years ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆34Updated 8 months ago
- Tool to discover external and internal network attack surface☆195Updated 11 months ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 2 weeks ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 9 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆63Updated last year
- ☆43Updated 2 years ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated last month
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆141Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆84Updated 4 months ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated last month
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆83Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆74Updated 11 months ago
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆86Updated this week
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Open Threat Hunting Framework☆114Updated last year
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆71Updated last year
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆138Updated 9 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆126Updated 9 months ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆81Updated this week
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated this week
- ☆65Updated 3 years ago
- Enterprise Response Model & Common Knowledge☆36Updated 10 months ago
- HASH (HTTP Agnostic Software Honeypot)☆139Updated 11 months ago
- Convert Sigma rules to Wazuh rules☆64Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆52Updated last month
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆58Updated this week
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆72Updated last week
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆30Updated last month