π‘οΈ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Google Gemini insights, all on an interactive dashboard
β87Aug 13, 2025Updated 7 months ago
Alternatives and similar repositories for viper
Users that are interested in viper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MultiStep MCP That Returns CVE Information With EPSS Scoreβ13May 22, 2025Updated 10 months ago
- Wireless Network Security Analysis Toolβ16Apr 27, 2025Updated 10 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metricsβ220Updated this week
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.β79Mar 17, 2026Updated last week
- Convert Sigma rules to SIEM queries, directly in your browser.β113Jan 24, 2026Updated 2 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI β’ AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Multi-threading Leaks/Intelligence file parserβ15Mar 16, 2026Updated last week
- β20Apr 10, 2025Updated 11 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.β476Oct 29, 2025Updated 4 months ago
- Porting Windows Dynamic Link Libraries to Linuxβ20Jun 11, 2025Updated 9 months ago
- Kaze's openly available CVE vulnerability data.β16Apr 7, 2025Updated 11 months ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integrationβ¦β17May 11, 2025Updated 10 months ago
- CVE-2022-22978 Spring-Security bypass Demoβ16Jun 2, 2022Updated 3 years ago
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security β¦β56Nov 20, 2024Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis β¦β38Feb 20, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Common framework for designing a detection and response framework for the most common MFT solutionsβ16Aug 4, 2023Updated 2 years ago
- CyberX-AI-Digital-Twin is an AI-powered cybersecurity platform that uses digital twin technology to simulate, detect, and analyze cyber tβ¦β14Feb 13, 2025Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITREβ¦β1,206Dec 29, 2025Updated 2 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters β¦β304Mar 19, 2026Updated last week
- Tehsat Malware Traffic Generatorβ19Jul 10, 2021Updated 4 years ago
- This is a repository to experiment with MCP for securityβ47Jan 22, 2025Updated last year
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Reportβ28Oct 10, 2023Updated 2 years ago
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.β61Jan 2, 2026Updated 2 months ago
- β24Feb 18, 2025Updated last year
- End-to-end encrypted email - Proton Mail β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flowβ16Sep 10, 2024Updated last year
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, β¦β14Updated this week
- Run TTPs, with AI!β115Feb 23, 2026Updated last month
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. noβ¦β11Aug 9, 2020Updated 5 years ago
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidianβ18Aug 7, 2024Updated last year
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wriβ¦β37Dec 24, 2024Updated last year
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation toolsβ¦β154Mar 4, 2026Updated 3 weeks ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.β14Jun 14, 2024Updated last year
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the synβ¦β34Aug 7, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- β59Oct 17, 2024Updated last year
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threβ¦β694Jan 6, 2026Updated 2 months ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048βs patchβ14Aug 11, 2020Updated 5 years ago
- ResearchDev - XDR & SIEM Detectionβ66Apr 16, 2025Updated 11 months ago
- OWASP Foundation Web Respositoryβ22Oct 9, 2025Updated 5 months ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract textβ¦β12Mar 17, 2026Updated last week
- Phishing Reverse Proxy with MFA bypassβ17Jan 28, 2023Updated 3 years ago