trinitor / CVE-Vulnerability-Information-DownloaderLinks
Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to show how such a dashboard can be created.
☆144Updated 2 years ago
Alternatives and similar repositories for CVE-Vulnerability-Information-Downloader
Users that are interested in CVE-Vulnerability-Information-Downloader are comparing it to the libraries listed below
Sorting:
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆165Updated 2 years ago
- Tool to discover external and internal network attack surface☆199Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆221Updated 3 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆291Updated last year
- Signature based honeypot detector tool written in Golang☆98Updated 3 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- An open-source self-hosted purple team management web application.☆276Updated 2 months ago
- Shodan Monitoring integration for TheHive.☆131Updated 7 months ago
- Linux Security and Monitoring Scripts☆324Updated 9 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆158Updated 3 years ago
- Nuclei templates for honeypots detection.☆196Updated last year
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 8 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆165Updated 9 months ago
- Pwnspoof repository☆262Updated last year
- ☆22Updated 2 years ago
- ☆111Updated 2 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆71Updated last year
- ☆140Updated last week
- Extensible framework for analyzing publicly available information about vulnerabilities☆117Updated 2 months ago
- Memory Forensic System on Cloud☆90Updated last year
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 3 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆100Updated last year
- First iteration of ML based Feedback WAF☆59Updated last year
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆124Updated 4 years ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆29Updated 5 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated 11 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆111Updated 2 years ago