The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a provided CVE (Common Vulnerabilities and Exposures) identifier.
☆17Nov 11, 2024Updated last year
Alternatives and similar repositories for EPSS-Calculator
Users that are interested in EPSS-Calculator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayBackend pro…☆17Sep 26, 2024Updated last year
- ☆18Dec 15, 2020Updated 5 years ago
- Automated security investigation tool using Microsoft MCP Servers, GitHub Copilot, Python Modules and custom copilot-instructions.☆147Updated this week
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆33Mar 21, 2026Updated 3 weeks ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Programming Microsoft Sentinel book☆24Dec 13, 2023Updated 2 years ago
- Una colección de mini apps vulnerables desarrolladas en Python con Flask. Cada vulnerabilidad incluye tanto el código vulnerable como su …☆16May 14, 2025Updated 11 months ago
- App Startup 🚀 + Hilt 🗡 (a sample project that combines both to provide dependencies to Initializers)☆18Jan 16, 2025Updated last year
- Mixeway Scanner is Spring Boot application which aggregate integration with number of OpenSource Vulnerability scanners - both SAST and D…☆24Oct 7, 2021Updated 4 years ago
- Sandbox samples and monitor them with kunai☆30Mar 3, 2026Updated last month
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 10 months ago
- JAVA Spring-Boot implementation of REST API for OpenVAS Security Vulnerability Scanner. REST API is using gvm-cli in order to communicate…☆25Jan 17, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- ☆37Mar 2, 2026Updated last month
- ☆10Jul 1, 2023Updated 2 years ago
- ☆44Oct 11, 2023Updated 2 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Oct 23, 2023Updated 2 years ago
- 💅🏽 analyzes your github actions☆98Apr 8, 2026Updated last week
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- ☆36Mar 23, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- A native iOS and macOS application for monitoring and managing Frigate home surveillance events.☆24Mar 28, 2026Updated 3 weeks ago
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆75Apr 11, 2026Updated last week
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- Velociraptor Server hosted in Azure App Service☆59Jun 4, 2025Updated 10 months ago
- ☆10Jan 21, 2019Updated 7 years ago
- This free tool parses Google Takeout Location History Exports or Google Semantic Location History Warrant Return Data in a forensic manne…☆40Sep 26, 2025Updated 6 months ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- the CHANGELOG for Android Dev Launcher app☆30Dec 22, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- EPSS(Exploit Prediction Scoring System) API client☆20Oct 30, 2025Updated 5 months ago
- Developed a model to detect Phished emails from legitimate ones using the Spam Assassin dataset. Extracted relevant features by processi…☆16Feb 20, 2022Updated 4 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- ⚙️ Converts NDJson format data into CSV☆21Dec 15, 2024Updated last year
- ☆12Mar 28, 2026Updated 3 weeks ago
- WhatHitMe is a Python3 tool which provides the possible Groups and their attributed Campaigns that may have attacked you in an incident, …☆18Jun 29, 2023Updated 2 years ago