trinitor / CVE-Vulnerability-Information-DownloaderLinks
Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to show how such a dashboard can be created.
☆142Updated 2 years ago
Alternatives and similar repositories for CVE-Vulnerability-Information-Downloader
Users that are interested in CVE-Vulnerability-Information-Downloader are comparing it to the libraries listed below
Sorting:
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆167Updated 2 years ago
- Tool to discover external and internal network attack surface☆204Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated 2 weeks ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- ☆114Updated 2 years ago
- ☆142Updated 2 weeks ago
- Signature based honeypot detector tool written in Golang☆107Updated 9 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆298Updated last year
- Shodan Monitoring integration for TheHive.☆131Updated last year
- An open-source self-hosted purple team management web application.☆295Updated 2 weeks ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆219Updated 3 years ago
- Pwnspoof repository☆264Updated 2 years ago
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆63Updated 2 months ago
- Tools to assess DNS security.☆153Updated last year
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆126Updated 4 years ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆128Updated 2 weeks ago
- ☆25Updated 2 years ago
- ☆169Updated 3 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆228Updated last month
- Cloudformation Template to Launch the SOC from Kali Purple☆53Updated 2 years ago
- ☆197Updated 2 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- firedrill is a malware simulation harness for evaluating your security controls☆195Updated last year
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆127Updated 8 months ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆112Updated 2 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year