santosomar / kev_checker
A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog
☆18Updated last year
Alternatives and similar repositories for kev_checker:
Users that are interested in kev_checker are comparing it to the libraries listed below
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 7 months ago
- Collection of videos of Raids on Cybercriminals☆18Updated 4 months ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆24Updated 3 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- ☆15Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- WordPress version identification and vulnerability finder.☆30Updated 2 years ago
- ☆28Updated last month
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- Virus Total Free - IOC parser and report generator☆23Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- ☆14Updated 2 weeks ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 9 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 2 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆23Updated last week
- This Repository gives the best and possible strategies against hunting the ransomware☆25Updated 2 years ago
- Bloodhound Portable for Windows☆51Updated last year
- ☆18Updated last year
- This script is to build Wazuh 4.3 environment☆13Updated 2 years ago
- ReconPal: Leveraging NLP for Infosec☆55Updated 2 years ago
- create a "simulated internet" cyber range environment☆15Updated 2 weeks ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Windows Security Logging☆43Updated 2 years ago
- Sniffing out well-known threat groups☆28Updated 6 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- ☆36Updated 2 years ago