ozanunal0 / viperLinks
π‘οΈ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Google Gemini insights, all on an interactive dashboard
β81Updated 5 months ago
Alternatives and similar repositories for viper
Users that are interested in viper are comparing it to the libraries listed below
Sorting:
- Convert Sigma rules to SIEM queries, directly in your browser.β107Updated last month
- Mapping of open-source detection rules and atomic tests.β193Updated last year
- An index of publicly available and open-source threat detection rulesets.β130Updated 9 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.β53Updated last year
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.β50Updated 8 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structureβ¦β48Updated 7 months ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System incβ¦β95Updated 3 months ago
- A curated collection of DFIR skills and workflows for InfoSec practitioners.β214Updated this week
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitionersβ115Updated last year
- Cyber threat intelligence tool suite.β42Updated 9 months ago
- β101Updated last month
- Repo for experimenting and testing MCP server builds for CTI-related research.β27Updated 8 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraftβ83Updated last month
- God Mode Detection Rulesβ135Updated last year
- β119Updated 7 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β126Updated last year
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate suspβ¦β185Updated 11 months ago
- MCP to help Defenders Detection Engineer Harder and Smarterβ63Updated this week
- Jupyter Univere is a search engine for all infosec jupyter notebooksβ34Updated 9 months ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.β67Updated 5 months ago
- β75Updated last month
- A pySigma wrapper and langchain toolkit for automatic rule creation/translationβ90Updated 2 months ago
- β74Updated last week
- Turn any blog into structured threat intelligence.β48Updated this week
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so onβ84Updated last year
- Suzaku (ζ±ι) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.β163Updated last month
- Framework for Monitoring File Ingestion Source for Yara Matchesβ50Updated 10 months ago
- The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex Worldβ146Updated 2 weeks ago
- Intel Retrieval Augmented Generation (RAG) Utilitiesβ91Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.β49Updated 10 months ago