synfinner / KEVinLinks
The missing API for the CISA Known Exploited Vulnerabilities Catalog. This repository contains the source running at kevin.gtfkd.com
☆18Updated this week
Alternatives and similar repositories for KEVin
Users that are interested in KEVin are comparing it to the libraries listed below
Sorting:
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated 3 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated last month
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Updated last year
- A web scraper to create MISP events and reports☆17Updated 5 months ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆20Updated last week
- ☆15Updated 3 years ago
- ☆25Updated 3 years ago
- ☆22Updated 4 years ago
- ☆17Updated 10 months ago
- Can you pay the ransom in your country?☆14Updated last year
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- Open YARA scan- and search engine☆25Updated 9 months ago
- a common schema for internet-connected service discovery 🔎 📚☆22Updated 2 weeks ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆45Updated 4 years ago
- AIL project training materials☆38Updated 4 months ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Tools used by CSIRT and especially in the scope of CNW☆17Updated 5 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 7 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Updated 4 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated this week
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- TAPIR is a multi-user, client/server, incident response framework☆47Updated 3 years ago
- Converting data from services like Censys and Shodan to a common data model☆51Updated 5 months ago
- Attempt to replicate the functions of auto_rip by Corey Harrell in Python.☆13Updated last year
- NTFS file system specimens☆13Updated 2 years ago