🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Google Gemini insights, all on an interactive dashboard
☆88Aug 13, 2025Updated 8 months ago
Alternatives and similar repositories for viper
Users that are interested in viper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated detection rule analysis utility☆29Sep 22, 2022Updated 3 years ago
- MultiStep MCP That Returns CVE Information With EPSS Score☆13May 22, 2025Updated 10 months ago
- Wireless Network Security Analysis Tool☆16Apr 27, 2025Updated 11 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆222Updated this week
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Updated this week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Convert Sigma rules to SIEM queries, directly in your browser.☆114Apr 3, 2026Updated last week
- Porting Windows Dynamic Link Libraries to Linux☆20Jun 11, 2025Updated 10 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆479Oct 29, 2025Updated 5 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 11 months ago
- Kaze's openly available CVE vulnerability data.☆16Apr 7, 2025Updated last year
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated 11 months ago
- A simple script to read the contents of a zip/tar/folder and extract metadata☆22Mar 18, 2026Updated 3 weeks ago
- CVE-2022-22978 Spring-Security bypass Demo☆16Jun 2, 2022Updated 3 years ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆38Feb 20, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Common framework for designing a detection and response framework for the most common MFT solutions☆16Aug 4, 2023Updated 2 years ago
- CyberX-AI-Digital-Twin is an AI-powered cybersecurity platform that uses digital twin technology to simulate, detect, and analyze cyber t…☆14Feb 13, 2025Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 3 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆304Mar 19, 2026Updated 3 weeks ago
- Tehsat Malware Traffic Generator☆19Jul 10, 2021Updated 4 years ago
- A tool for managing compliance as code in your GitHub repositories.☆28Apr 7, 2026Updated last week
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- This is a repository to experiment with MCP for security☆47Jan 22, 2025Updated last year
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆28Oct 10, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆62Apr 3, 2026Updated last week
- ☆25Feb 18, 2025Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14Updated this week
- Library to consume project Open Source Insights Project from Google☆15Aug 24, 2024Updated last year
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆18Aug 7, 2024Updated last year
- Run TTPs, with AI!☆125Feb 23, 2026Updated last month
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆37Dec 24, 2024Updated last year
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆158Mar 23, 2026Updated 3 weeks ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Keyboard events simulator☆46Dec 11, 2013Updated 12 years ago
- ☆59Oct 17, 2024Updated last year
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆699Jan 6, 2026Updated 3 months ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆22Oct 9, 2025Updated 6 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year