The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a provided CVE (Common Vulnerabilities and Exposures) identifier.
☆17Nov 11, 2024Updated last year
Alternatives and similar repositories for EPSS-Calculator
Users that are interested in EPSS-Calculator are comparing it to the libraries listed below
Sorting:
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- Programming Microsoft Sentinel book☆25Dec 13, 2023Updated 2 years ago
- ☆10Sep 10, 2024Updated last year
- Sandbox samples and monitor them with kunai☆29Updated this week
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆34Aug 7, 2024Updated last year
- This free tool parses Google Takeout Location History Exports or Google Semantic Location History Warrant Return Data in a forensic manne…☆40Sep 26, 2025Updated 5 months ago
- https://academy.tcm-sec.com/☆14Aug 19, 2025Updated 6 months ago
- ☆35Mar 23, 2024Updated last year
- Incident Notification Platform by @NC3-LU☆11Updated this week
- ☆37Updated this week
- My stuff regarding Copilot for Security☆12Jan 12, 2026Updated last month
- Security research organization dedicated to finding low hanging, critical, vulnerabilities.☆15May 12, 2022Updated 3 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- NATO Interoperability Standards and Profiles☆17Apr 12, 2024Updated last year
- ☆43Oct 11, 2023Updated 2 years ago
- A collection of tools and schemas in Rust to analyze data on IPFS and BitSwap traces.☆10Dec 3, 2025Updated 3 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Olympic Games dashboard for the "Build-a-Dashboard" workshop at posit::conf(2024)☆12Aug 13, 2024Updated last year
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- A powerful hardware ID spoofing tool designed to modify system identifiers for privacy and security purposes. Change MAC addresses, HWID,…☆26Feb 28, 2026Updated last week
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- BCP documents and website of GCVE☆55Feb 16, 2026Updated 2 weeks ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Oct 23, 2023Updated 2 years ago
- SAMPLE: Elixir Application☆13Jan 26, 2021Updated 5 years ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Apr 14, 2015Updated 10 years ago
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- ☆12Updated this week
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- Scripts with all the steps to create the RStudio Server image from DigitalOcean Marketplace☆10Feb 28, 2021Updated 5 years ago
- Pop Os dotfiles☆10Mar 18, 2023Updated 2 years ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆12Jan 19, 2024Updated 2 years ago
- A toolkit for CTF challenges☆10Jan 18, 2017Updated 9 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Jan 16, 2026Updated last month
- Base Nerves system for a Qemu ARM image (Not maintained)☆13Aug 25, 2018Updated 7 years ago
- Simple example of using binary websocket messages within Phoenix☆13Feb 26, 2021Updated 5 years ago