trinitor / CVE-Vulnerability-Information-DownloaderLinks
Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to show how such a dashboard can be created.
☆143Updated 2 years ago
Alternatives and similar repositories for CVE-Vulnerability-Information-Downloader
Users that are interested in CVE-Vulnerability-Information-Downloader are comparing it to the libraries listed below
Sorting:
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆164Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆290Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- An open-source self-hosted purple team management web application.☆274Updated last month
- Tool to discover external and internal network attack surface☆198Updated last year
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆165Updated 8 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆111Updated 2 years ago
- MISP Playbooks☆203Updated last week
- ☆293Updated 10 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆248Updated 7 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆193Updated last year
- Nuclei templates for honeypots detection.☆196Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated 9 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆97Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- ☆111Updated 2 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆121Updated 2 years ago
- Signature based honeypot detector tool written in Golang☆97Updated 3 months ago
- God Mode Detection Rules☆134Updated 10 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆282Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆77Updated last year
- https://lolad-project.github.io/☆77Updated 5 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆158Updated 2 years ago
- Shodan Monitoring integration for TheHive.☆130Updated 6 months ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆246Updated 2 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆108Updated 7 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated 2 months ago
- Memory Forensic System on Cloud☆90Updated last year