trinitor / CVE-Vulnerability-Information-DownloaderLinks
Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to show how such a dashboard can be created.
☆142Updated 2 years ago
Alternatives and similar repositories for CVE-Vulnerability-Information-Downloader
Users that are interested in CVE-Vulnerability-Information-Downloader are comparing it to the libraries listed below
Sorting:
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆166Updated 2 years ago
- Tool to discover external and internal network attack surface☆203Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- Signature based honeypot detector tool written in Golang☆104Updated 6 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆299Updated last year
- An open-source self-hosted purple team management web application.☆290Updated last month
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- ☆163Updated last week
- ☆113Updated 2 years ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆248Updated 10 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆57Updated last month
- Nuclei templates for honeypots detection.☆195Updated last year
- Extensible framework for analyzing publicly available information about vulnerabilities☆117Updated 4 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆246Updated last year
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆219Updated 3 years ago
- Tools to assess DNS security.☆152Updated last year
- ☆140Updated last week
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆109Updated 10 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆163Updated 3 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆71Updated last year
- Linux Security and Monitoring Scripts☆327Updated last week
- ☆194Updated 2 years ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆56Updated this week
- CALDERA plugin for adversary emulation of AI-enabled systems☆101Updated 2 years ago
- Halberd : Multi-Cloud Agentic Attack Tool☆312Updated last month
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆102Updated last year
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆125Updated 4 years ago