vulncheck-oss / cliLinks
VulnCheck's official command line tool
☆139Updated 2 weeks ago
Alternatives and similar repositories for cli
Users that are interested in cli are comparing it to the libraries listed below
Sorting:
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- ☆164Updated this week
- Mirror of cisa.gov/kev data files☆55Updated last week
- Anvilogic Forge☆107Updated 2 weeks ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- ☆146Updated this week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆102Updated last year
- Code and Website For PatchThis.app☆32Updated this week
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 10 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆284Updated last year
- Dorothy is a tool to test security monitoring and detection for Okta environments☆186Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆165Updated last week
- Stakeholder-Specific Vulnerability Categorization☆163Updated this week
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆81Updated last week
- pocket guide for core detection engineering concepts☆30Updated 2 years ago
- An index of publicly available and open-source threat detection rulesets.☆124Updated 4 months ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆162Updated this week
- This is a collection of threat detection rules / rules engines that I have come across.☆296Updated last year
- ☆119Updated last year
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 9 months ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 2 months ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆149Updated last year
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆29Updated 7 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆190Updated last year
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated last year
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆256Updated 9 months ago
- ☆65Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆163Updated 6 months ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆29Updated 2 years ago