ozanunal0 / viperLinks
π‘οΈ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Google Gemini insights, all on an interactive dashboard
β59Updated this week
Alternatives and similar repositories for viper
Users that are interested in viper are comparing it to the libraries listed below
Sorting:
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.β51Updated 8 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?β51Updated 3 weeks ago
- Convert Sigma rules to SIEM queries, directly in your browser.β89Updated last week
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.β45Updated 2 months ago
- Framework for Monitoring File Ingestion Source for Yara Matchesβ47Updated 3 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to theirβ¦β26Updated 7 months ago
- Data from Dark Web Marketplace scraping - Be carefulβ39Updated 7 months ago
- An index of publicly available and open-source threat detection rulesets.β114Updated 2 months ago
- Cyber threat intelligence tool suite.β39Updated 2 months ago
- Repository of tools and resources for analyzing Docker containersβ66Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β124Updated last year
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scrapingβ51Updated 5 months ago
- Mapping of open-source detection rules and atomic tests.β168Updated 5 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation toolsβ¦β99Updated 3 weeks ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structureβ¦β27Updated this week
- Turn any blog into structured threat intelligence.β32Updated last week
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.β66Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data wβ¦β52Updated 6 months ago
- Rules shared by the community from 100 Days of YARA 2025β33Updated 5 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translationβ81Updated last month
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users inβ¦β30Updated 2 months ago
- Baseline a Windows System against LOLBASβ27Updated last year
- SigmaHQ pySigma CrowdStrike processing pipelineβ26Updated 8 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.β26Updated last month
- Finding ClickFix and FakeCAPTCHA like it's 1999β39Updated this week
- Jupyter Univere is a search engine for all infosec jupyter notebooksβ26Updated 3 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitionersβ96Updated 7 months ago
- β92Updated last month
- This is a repository to experiment with MCP for securityβ39Updated 5 months ago
- NOVA: The Prompt Pattern Matchingβ123Updated last month