synfinner / KEVinLinks
The missing API for the CISA Known Exploited Vulnerabilities Catalog. This repository contains the source running at kevin.gtfkd.com
☆18Updated 2 weeks ago
Alternatives and similar repositories for KEVin
Users that are interested in KEVin are comparing it to the libraries listed below
Sorting:
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated 4 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Can you pay the ransom in your country?☆14Updated 2 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆22Updated last month
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 2 months ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated 2 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 8 months ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Updated 3 years ago
- TAPIR is a multi-user, client/server, incident response framework☆48Updated 3 years ago
- A web scraper to create MISP events and reports☆17Updated 6 months ago
- ☆24Updated 3 years ago
- A Python DNS crawler to find identical domain names under different TLDs.☆25Updated 6 years ago
- a common schema for internet-connected service discovery 🔎 📚☆22Updated 3 weeks ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆21Updated last week
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 5 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated last month
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- Yara rules☆22Updated 2 years ago
- Penguin OS Forensic (or Flight) Recorder☆41Updated last year
- Offensive Research Guide to Help Defense Improve Detection☆31Updated 2 years ago
- Tools used by CSIRT and especially in the scope of CNW☆17Updated 6 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆45Updated 4 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆37Updated 3 weeks ago
- Converting data from services like Censys and Shodan to a common data model☆50Updated 3 weeks ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆28Updated 9 months ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Updated 2 years ago
- C2 Active Scanner☆60Updated last year
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago