ozanunal0 / viperLinks
π‘οΈ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Google Gemini insights, all on an interactive dashboard
β77Updated last month
Alternatives and similar repositories for viper
Users that are interested in viper are comparing it to the libraries listed below
Sorting:
- Convert Sigma rules to SIEM queries, directly in your browser.β95Updated this week
- Mapping of open-source detection rules and atomic tests.β176Updated 8 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.β52Updated 10 months ago
- β96Updated last month
- An index of publicly available and open-source threat detection rulesets.β124Updated 5 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structureβ¦β45Updated 2 months ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.β48Updated 4 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate suspβ¦β178Updated 7 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translationβ84Updated 4 months ago
- Anvilogic Forgeβ107Updated this week
- Repo for experimenting and testing MCP server builds for CTI-related research.β27Updated 4 months ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.β50Updated last month
- Suzaku (ζ±ι) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.β147Updated last week
- β116Updated 3 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitionersβ106Updated 10 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to automβ¦β49Updated 3 weeks ago
- Finding ClickFix and FakeCAPTCHA like it's 1999β58Updated this week
- Cyber threat intelligence tool suite.β42Updated 5 months ago
- Sigma detection rules for hunting with the threathunting-keywords projectβ56Updated 6 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to theirβ¦β27Updated 9 months ago
- Jupyter Univere is a search engine for all infosec jupyter notebooksβ28Updated 5 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with β¦β128Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β125Updated last year
- God Mode Detection Rulesβ134Updated last year
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CKβ69Updated 2 weeks ago
- CarbonBlack EDR detection rules and response actionsβ71Updated last year
- A collection of various SIEM rules relating to malware family groups.β69Updated last year
- A home for detection content developed by the delivr.to teamβ70Updated last month
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?β57Updated 2 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so onβ82Updated last year