trinitor / CVE-Vulnerability-Information-DownloaderLinks
Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to show how such a dashboard can be created.
☆144Updated 2 years ago
Alternatives and similar repositories for CVE-Vulnerability-Information-Downloader
Users that are interested in CVE-Vulnerability-Information-Downloader are comparing it to the libraries listed below
Sorting:
- Tool to discover external and internal network attack surface☆200Updated last year
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆166Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Signature based honeypot detector tool written in Golang☆99Updated 4 months ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- An open-source self-hosted purple team management web application.☆278Updated last week
- Nuclei templates for honeypots detection.☆197Updated last year
- Shodan Monitoring integration for TheHive.☆131Updated 7 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 10 months ago
- ☆140Updated last week
- This is a collection of threat detection rules / rules engines that I have come across.☆293Updated last year
- This repo contains IOC, malware and malware analysis associated with Public cloud☆248Updated 8 months ago
- ☆191Updated 2 years ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆221Updated 3 years ago
- ☆112Updated 2 years ago
- Memory Forensic System on Cloud☆90Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆158Updated 3 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆52Updated last month
- Pwnspoof repository☆264Updated last year
- Extensible framework for analyzing publicly available information about vulnerabilities☆117Updated 2 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆71Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- Tools to assess DNS security.☆152Updated last year
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 4 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆299Updated 3 weeks ago
- ☆119Updated 2 years ago
- ☆22Updated 2 years ago
- God Mode Detection Rules☆134Updated last year