theowni / EPSS-CalculatorView external linksLinks
The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a provided CVE (Common Vulnerabilities and Exposures) identifier.
☆17Nov 11, 2024Updated last year
Alternatives and similar repositories for EPSS-Calculator
Users that are interested in EPSS-Calculator are comparing it to the libraries listed below
Sorting:
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- Sandbox samples and monitor them with kunai☆29Jun 24, 2025Updated 7 months ago
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆34Aug 7, 2024Updated last year
- A powerful hardware ID spoofing tool designed to modify system identifiers for privacy and security purposes. Change MAC addresses, HWID,…☆16Nov 26, 2025Updated 2 months ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- ☆35Mar 23, 2024Updated last year
- ☆36Nov 11, 2025Updated 3 months ago
- ☆42Oct 11, 2023Updated 2 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- ☆10Jul 1, 2023Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- My stuff regarding Copilot for Security☆12Jan 12, 2026Updated last month
- NATO Interoperability Standards and Profiles☆17Apr 12, 2024Updated last year
- A collection of tools and schemas in Rust to analyze data on IPFS and BitSwap traces.☆10Dec 3, 2025Updated 2 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Oct 23, 2023Updated 2 years ago
- BCP documents and website of GCVE☆55Feb 9, 2026Updated last week
- POC☆12Apr 26, 2022Updated 3 years ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- A simple lyrics editor (generator and organizer as well) for .LRC files.☆11Oct 27, 2023Updated 2 years ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Apr 14, 2015Updated 10 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 8 months ago
- signs things with ssh-ed25519 keys☆13Jan 4, 2019Updated 7 years ago
- Recordization library☆11Updated this week
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- Core Elixir IPFS☆12Jan 26, 2025Updated last year
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated last year
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Jul 30, 2025Updated 6 months ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- A toolkit for CTF challenges☆10Jan 18, 2017Updated 9 years ago
- (DEPRECATED) A set of launcher scripts to be used with OAR and Slurm for running jobs on the UL HPC platform☆14Oct 23, 2020Updated 5 years ago
- Pop Os dotfiles☆10Mar 18, 2023Updated 2 years ago
- ☆10Aug 9, 2024Updated last year
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- Simple example of using binary websocket messages within Phoenix☆13Feb 26, 2021Updated 4 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Sep 2, 2025Updated 5 months ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 2 years ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 3 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago