synfinner / KEVinLinks
The missing API for the CISA Known Exploited Vulnerabilities Catalog. This repository contains the source running at kevin.gtfkd.com
☆16Updated last month
Alternatives and similar repositories for KEVin
Users that are interested in KEVin are comparing it to the libraries listed below
Sorting:
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated 2 weeks ago
- ☆25Updated 2 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- A web scraper to create MISP events and reports☆16Updated 2 months ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- Converting data from services like Censys and Shodan to a common data model☆50Updated 2 months ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated last week
- ☆22Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Useful commands for infosec☆29Updated 2 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Updated last year
- Low budget VirusTotal Intelligence Cosplay☆20Updated 3 years ago
- Can you pay the ransom in your country?☆15Updated last year
- ☆19Updated 2 months ago
- ☆14Updated 7 years ago
- Python emulator for Excel XLM macros.☆18Updated 5 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- Attempt to replicate the functions of auto_rip by Corey Harrell in Python.☆13Updated last year
- NTFS file system specimens☆13Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆26Updated 3 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 2 months ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- ☆15Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 2 weeks ago