trinitor / CVE-Vulnerability-Information-Downloader
Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to show how such a dashboard can be created.
☆136Updated last year
Related projects: ⓘ
- An open-source self-hosted purple team management web application.☆232Updated last month
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆142Updated last year
- Tool to discover external and internal network attack surface☆188Updated 3 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆152Updated 2 months ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆121Updated last year
- Nuclei templates for honeypots detection.☆185Updated 10 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆236Updated 4 months ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆220Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆270Updated 4 months ago
- ☆108Updated last year
- ShellSweeping the evil.☆134Updated last month
- ☆121Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated 9 months ago
- MISP Playbooks☆167Updated 3 weeks ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆241Updated this week
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆159Updated last month
- God Mode Detection Rules☆130Updated last month
- Shodan Monitoring integration for TheHive.☆129Updated 2 years ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆159Updated 5 months ago
- Hourly updated database of exploit and exploitation reports☆231Updated this week
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆308Updated 2 months ago
- Azure mindmap for penetration tests☆157Updated 9 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆82Updated 8 months ago
- HASH (HTTP Agnostic Software Honeypot)☆128Updated 4 months ago
- Data visualization for blue teams☆122Updated last year
- Zero-dollar attack surface management tool☆247Updated 5 months ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆200Updated 9 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆108Updated 5 months ago
- Dredging up secrets from the depths of the file system☆110Updated 4 months ago
- ☆167Updated last year