trinitor / CVE-Vulnerability-Information-Downloader
Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to show how such a dashboard can be created.
☆141Updated 2 years ago
Alternatives and similar repositories for CVE-Vulnerability-Information-Downloader:
Users that are interested in CVE-Vulnerability-Information-Downloader are comparing it to the libraries listed below
- Tool to discover external and internal network attack surface☆195Updated 11 months ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆162Updated 2 years ago
- An open-source self-hosted purple team management web application.☆268Updated 3 weeks ago
- Nuclei templates for honeypots detection.☆196Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 11 months ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆221Updated 3 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆285Updated 11 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆189Updated 9 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 5 months ago
- HASH (HTTP Agnostic Software Honeypot)☆139Updated 11 months ago
- ☆110Updated last year
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆49Updated 3 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 6 months ago
- Signature based honeypot detector tool written in Golang☆89Updated last month
- ☆160Updated last year
- Halberd : Multi-Cloud Attack Platform☆269Updated last week
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆52Updated last month
- Shodan Monitoring integration for TheHive.☆130Updated 4 months ago
- ☆187Updated 2 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 3 weeks ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165Updated last year
- firedrill is a malware simulation harness for evaluating your security controls☆179Updated last year
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆327Updated last month
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated last month
- MISP Playbooks☆197Updated 2 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆122Updated last year
- A runbook for handling security incidents in cooperation with 0xsyr0☆51Updated 2 years ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆194Updated 3 months ago
- MITRE Caldera™ for OT Plugins & Capabilities☆207Updated 5 months ago