trinitor / CVE-Vulnerability-Information-Downloader
Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to show how such a dashboard can be created.
☆137Updated last year
Related projects ⓘ
Alternatives and complementary repositories for CVE-Vulnerability-Information-Downloader
- An open-source self-hosted purple team management web application.☆241Updated 3 months ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆143Updated last year
- Tool to discover external and internal network attack surface☆192Updated 6 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated 11 months ago
- Halberd : Multi-Cloud Attack Tool☆208Updated this week
- A collection of companies that disclose adversary TTPs after they have been breached☆241Updated 6 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆168Updated 4 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆161Updated last month
- HASH (HTTP Agnostic Software Honeypot)☆128Updated 6 months ago
- ☆215Updated 4 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆84Updated 10 months ago
- ☆196Updated 4 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆244Updated last week
- This is a collection of threat detection rules / rules engines that I have come across.☆275Updated 6 months ago
- https://lolad-project.github.io/☆60Updated 2 weeks ago
- An ADCS honeypot to catch attackers in your internal network.☆224Updated 4 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆116Updated 3 months ago
- MISP Playbooks☆174Updated last month
- God Mode Detection Rules☆131Updated 3 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆40Updated 2 months ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆124Updated last year
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆207Updated 2 months ago
- ☆292Updated 3 months ago
- Azure mindmap for penetration tests☆161Updated last year
- Dredging up secrets from the depths of the file system☆116Updated 2 weeks ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆237Updated 2 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆44Updated 3 weeks ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆98Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆159Updated 6 months ago
- ☆110Updated last year