trinitor / CVE-Vulnerability-Information-DownloaderLinks
Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to show how such a dashboard can be created.
☆144Updated 2 years ago
Alternatives and similar repositories for CVE-Vulnerability-Information-Downloader
Users that are interested in CVE-Vulnerability-Information-Downloader are comparing it to the libraries listed below
Sorting:
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆166Updated 2 years ago
- Tool to discover external and internal network attack surface☆203Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- Signature based honeypot detector tool written in Golang☆103Updated 5 months ago
- An open-source self-hosted purple team management web application.☆287Updated 3 weeks ago
- This is a collection of threat detection rules / rules engines that I have come across.☆297Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆160Updated 3 years ago
- ☆164Updated this week
- Linux Security and Monitoring Scripts☆325Updated 11 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 10 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- Nuclei templates for honeypots detection.☆196Updated last year
- Memory Forensic System on Cloud☆91Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆102Updated last year
- Pwnspoof repository☆264Updated 2 years ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- Data visualization for blue teams☆126Updated 2 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆109Updated 10 months ago
- ☆140Updated 2 weeks ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated last year
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 5 months ago
- ☆113Updated 2 years ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆99Updated 2 years ago
- Cloudformation Template to Launch the SOC from Kali Purple☆52Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆56Updated 3 weeks ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆219Updated 3 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆66Updated last year
- Halberd : Multi-Cloud Agentic Attack Tool☆309Updated 2 weeks ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago