Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to show how such a dashboard can be created.
☆142Jan 24, 2023Updated 3 years ago
Alternatives and similar repositories for CVE-Vulnerability-Information-Downloader
Users that are interested in CVE-Vulnerability-Information-Downloader are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago
- ☆58Updated this week
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Sep 11, 2024Updated last year
- Find Email Spoofing Vulnerablity of domains☆96Jul 30, 2024Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated 2 weeks ago
- ☆30Mar 23, 2026Updated 3 weeks ago
- ☆13Mar 1, 2024Updated 2 years ago
- An Ansible role to install cobalt-strike☆15Aug 24, 2020Updated 5 years ago
- ☆109Feb 21, 2023Updated 3 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆46Mar 31, 2026Updated 2 weeks ago
- Status Checker is a Python tool for swiftly checking the status of URLs. It categorizes responses by HTTP status codes, offering clear in…☆50May 18, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆591Nov 9, 2024Updated last year
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆142Feb 26, 2026Updated last month
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated last year
- Passive-Recursive DNS daemon☆26Sep 20, 2024Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Dec 26, 2023Updated 2 years ago
- An AI-powered Personal Identifiable Information (PII) scanner.☆726Jan 22, 2025Updated last year
- Dast tool☆13Jul 28, 2023Updated 2 years ago
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Dump place details from Google Maps like phone,email,website,and reviews☆73Jun 3, 2025Updated 10 months ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- A GraphQL enumeration and extraction tool☆133Jan 29, 2023Updated 3 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆69Mar 4, 2023Updated 3 years ago
- Raf Scanner IDE☆12Apr 14, 2023Updated 3 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- Fork of OpenSearch Dashboards Security Plugin.☆14Apr 9, 2026Updated last week
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆159Nov 26, 2023Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Dec 13, 2025Updated 4 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- An extension to use Semgrep inside Burp Suite.☆88May 23, 2025Updated 10 months ago
- Cloud Exploit Framework☆112May 11, 2022Updated 3 years ago
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆181Dec 22, 2025Updated 3 months ago