trinitor / CVE-Vulnerability-Information-DownloaderLinks
Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to show how such a dashboard can be created.
☆143Updated 2 years ago
Alternatives and similar repositories for CVE-Vulnerability-Information-Downloader
Users that are interested in CVE-Vulnerability-Information-Downloader are comparing it to the libraries listed below
Sorting:
- Tool to discover external and internal network attack surface☆204Updated last year
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆166Updated 2 years ago
- HASH (HTTP Agnostic Software Honeypot)☆140Updated last year
- ☆141Updated last week
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆299Updated last year
- An open-source self-hosted purple team management web application.☆292Updated last month
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆163Updated 3 years ago
- Signature based honeypot detector tool written in Golang☆106Updated 7 months ago
- Shodan Monitoring integration for TheHive.☆131Updated 11 months ago
- ☆114Updated 2 years ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated last year
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆219Updated 3 years ago
- ☆166Updated last month
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- Create honeypots for cloud environments☆103Updated last month
- Pwnspoof repository☆265Updated 2 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆59Updated 2 months ago
- Cloudformation Template to Launch the SOC from Kali Purple☆53Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated last year
- Extensible framework for analyzing publicly available information about vulnerabilities☆117Updated 6 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆103Updated 2 years ago
- ☆25Updated 2 years ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆29Updated 9 months ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 7 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Updated last week
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆112Updated 2 years ago