trinitor / CVE-Vulnerability-Information-Downloader
Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to show how such a dashboard can be created.
☆141Updated 2 years ago
Alternatives and similar repositories for CVE-Vulnerability-Information-Downloader:
Users that are interested in CVE-Vulnerability-Information-Downloader are comparing it to the libraries listed below
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆143Updated last year
- An open-source self-hosted purple team management web application.☆264Updated this week
- This is a collection of threat detection rules / rules engines that I have come across.☆283Updated 10 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 11 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆183Updated 8 months ago
- Tool to discover external and internal network attack surface☆195Updated 10 months ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated 10 months ago
- Nuclei templates for honeypots detection.☆195Updated last year
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 5 months ago
- ☆110Updated last year
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆241Updated 2 years ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 4 months ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆181Updated last week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆91Updated last year
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆221Updated 2 years ago
- Memory Forensic System on Cloud☆89Updated last year
- https://lolad-project.github.io/☆74Updated 2 months ago
- Halberd : Multi-Cloud Attack Platform☆251Updated 3 weeks ago
- God Mode Detection Rules☆134Updated 7 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆138Updated 2 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Mapping of open-source detection rules and atomic tests.☆156Updated 2 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆325Updated 3 weeks ago
- Zero-dollar attack surface management tool☆276Updated 11 months ago
- ShellSweeping the evil.☆163Updated 4 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated last year