ozanunal0 / viperLinks
π‘οΈ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Google Gemini insights, all on an interactive dashboard
β37Updated this week
Alternatives and similar repositories for viper
Users that are interested in viper are comparing it to the libraries listed below
Sorting:
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?β43Updated this week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β124Updated last year
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to theirβ¦β26Updated 6 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.β81Updated last week
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation toolsβ¦β94Updated last week
- Mapping of open-source detection rules and atomic tests.β165Updated 4 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reportsβ118Updated last week
- An index of publicly available and open-source threat detection rulesets.β112Updated last month
- A pySigma wrapper and langchain toolkit for automatic rule creation/translationβ81Updated 2 weeks ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Teamβ18Updated 7 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so onβ82Updated last year
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.β43Updated last month
- Jupyter Univere is a search engine for all infosec jupyter notebooksβ26Updated 2 months ago
- π§° ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.β74Updated last month
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to automβ¦β47Updated last year
- β74Updated 2 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.β64Updated last year
- Finding ClickFix and FakeCAPTCHA like it's 1999β38Updated this week
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.β51Updated 7 months ago
- Living Off Security Toolsβ45Updated 7 months ago
- Data from Dark Web Marketplace scraping - Be carefulβ39Updated 7 months ago
- NOVA: The Prompt Pattern Matchingβ111Updated last month
- CarbonBlack EDR detection rules and response actionsβ71Updated 8 months ago
- β33Updated 6 months ago
- MS Graph Commands and Tools for Blue Teamersβ49Updated last year
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scrapingβ51Updated 4 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Responsβ¦β54Updated 7 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitionersβ91Updated 7 months ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.β15Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data β¦β138Updated 3 months ago