π‘οΈ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Google Gemini insights, all on an interactive dashboard
β85Aug 13, 2025Updated 6 months ago
Alternatives and similar repositories for viper
Users that are interested in viper are comparing it to the libraries listed below
Sorting:
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.β79Feb 4, 2026Updated last month
- MultiStep MCP That Returns CVE Information With EPSS Scoreβ13May 22, 2025Updated 9 months ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.β12Jun 25, 2018Updated 7 years ago
- β20Apr 10, 2025Updated 10 months ago
- Wireless Network Security Analysis Toolβ16Apr 27, 2025Updated 10 months ago
- Automated detection rule analysis utilityβ28Sep 22, 2022Updated 3 years ago
- Porting Windows Dynamic Link Libraries to Linuxβ20Jun 11, 2025Updated 8 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metricsβ216Updated this week
- This is a repository to experiment with MCP for securityβ47Jan 22, 2025Updated last year
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering inβ¦β32Jul 31, 2025Updated 7 months ago
- Run TTPs, with AI!β71Feb 23, 2026Updated last week
- β39Jul 1, 2025Updated 8 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.β111Jan 24, 2026Updated last month
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters β¦β302Updated this week
- Scripts to check for security issues with SSH keys and authorized_keys files on Linux and other Unix-like operating systems.β23Sep 29, 2025Updated 5 months ago
- Phishing Reverse Proxy with MFA bypassβ17Jan 28, 2023Updated 3 years ago
- A simple script to read the contents of a zip/tar/folder and extract metadataβ21Oct 6, 2025Updated 4 months ago
- Quick ESXi Log Parserβ29Oct 20, 2025Updated 4 months ago
- β24Feb 18, 2025Updated last year
- Useful OSINT tools for Discordβ23Jan 21, 2026Updated last month
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security β¦β56Nov 20, 2024Updated last year
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.β77Apr 6, 2025Updated 10 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITREβ¦β1,205Dec 29, 2025Updated 2 months ago
- A curated list of Telco Cloud ecosystem projects and resources βοΈβ25Feb 4, 2026Updated last month
- PowerShell tools to help defenders hunt smarter, hunt harder.β473Oct 29, 2025Updated 4 months ago
- This repository is for public files shared by the Microsoft Information Protection Teamβ25Jan 6, 2021Updated 5 years ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation toolsβ¦β150Feb 14, 2026Updated 2 weeks ago
- Red Team AI promptsβ49Dec 2, 2025Updated 3 months ago
- ResearchDev - XDR & SIEM Detectionβ67Apr 16, 2025Updated 10 months ago
- An offensive toolkit for restless guests #DEFCON33β53Aug 11, 2025Updated 6 months ago
- β31Oct 28, 2024Updated last year
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Reportβ28Oct 10, 2023Updated 2 years ago
- β33Dec 10, 2024Updated last year
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structureβ¦β51Jun 21, 2025Updated 8 months ago
- Instant, in-browser decoding of ProtoBuf, bplist, ASN.1, NSArchive, and OPACK payloadsβ38Feb 11, 2026Updated 3 weeks ago
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wriβ¦β37Dec 24, 2024Updated last year
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threβ¦β691Jan 6, 2026Updated last month
- A class validation and transformation library, to ensure secure data structures in Python.β10May 16, 2024Updated last year
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the synβ¦β34Aug 7, 2024Updated last year