trinitor / CVE-Vulnerability-Information-Downloader
Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to show how such a dashboard can be created.
☆141Updated 2 years ago
Alternatives and similar repositories for CVE-Vulnerability-Information-Downloader:
Users that are interested in CVE-Vulnerability-Information-Downloader are comparing it to the libraries listed below
- An open-source self-hosted purple team management web application.☆255Updated last month
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆143Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆281Updated 9 months ago
- Nuclei templates for honeypots detection.☆196Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆182Updated 7 months ago
- Tool to discover external and internal network attack surface☆194Updated 9 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆136Updated 9 months ago
- MISP Playbooks☆184Updated last week
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆320Updated 3 months ago
- Zero-dollar attack surface management tool☆270Updated 10 months ago
- Halberd : Multi-Cloud Attack Platform☆248Updated 2 weeks ago
- MITRE Caldera™ for OT Plugins & Capabilities☆203Updated 3 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 9 months ago
- ShellSweeping the evil.☆163Updated 2 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 4 months ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆220Updated 2 years ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆249Updated last year
- ☆158Updated last year
- Blue Team detection lab created with Terraform and Ansible in Azure.☆145Updated 3 months ago
- Signature based honeypot detector tool written in Golang☆89Updated 2 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆248Updated 3 months ago
- ☆289Updated 6 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 10 months ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 9 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆91Updated last year
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆209Updated this week
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆616Updated 8 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆242Updated this week
- Rapidly Search and Hunt through Linux Forensics Artifacts☆189Updated last year