ozanunal0 / viperLinks
π‘οΈ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Google Gemini insights, all on an interactive dashboard
β78Updated last month
Alternatives and similar repositories for viper
Users that are interested in viper are comparing it to the libraries listed below
Sorting:
- An index of publicly available and open-source threat detection rulesets.β125Updated 5 months ago
- Mapping of open-source detection rules and atomic tests.β177Updated 8 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.β96Updated this week
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.β49Updated 5 months ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.β53Updated last month
- β96Updated 2 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.β52Updated 11 months ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System incβ¦β73Updated last week
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structureβ¦β45Updated 3 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with β¦β131Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β125Updated last year
- Repo for experimenting and testing MCP server builds for CTI-related research.β27Updated 4 months ago
- SigmaHQ pySigma CrowdStrike processing pipelineβ26Updated last month
- Cyber threat intelligence tool suite.β42Updated 6 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate suspβ¦β180Updated 8 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translationβ84Updated 4 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to theirβ¦β27Updated 10 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitionersβ110Updated 11 months ago
- God Mode Detection Rulesβ134Updated last year
- β72Updated last month
- Suzaku (ζ±ι) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.β151Updated last week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraftβ79Updated last month
- Turn any blog into structured threat intelligence.β37Updated this week
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so onβ83Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor manβs SOC.β51Updated 9 months ago
- β116Updated 4 months ago
- Framework for Monitoring File Ingestion Source for Yara Matchesβ50Updated 7 months ago
- A home for detection content developed by the delivr.to teamβ71Updated 2 months ago
- Sigma detection rules for hunting with the threathunting-keywords projectβ56Updated 7 months ago
- Anvilogic Forgeβ108Updated 3 weeks ago