vulsio / go-kev
Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.
☆18Updated last week
Alternatives and similar repositories for go-kev:
Users that are interested in go-kev are comparing it to the libraries listed below
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆70Updated 2 years ago
- R-CSIRT Linux Triage tool☆38Updated 6 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆24Updated 3 years ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 2 years ago
- 高対話型ハニーポット☆27Updated 6 years ago
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆152Updated 2 years ago
- Automatically update IoC for lucky visitor scam☆26Updated this week
- Prompt Hardener is a tool designed to evaluate and enhance the securify of system prompts for RAG systems.☆15Updated 3 months ago
- Ghidra Script for automated analysis of EMOTET☆17Updated 4 years ago
- Stakeholder-Specific Vulnerability Categorization☆139Updated this week
- Phishing URL dataset from JPCERT/CC☆171Updated 2 weeks ago
- Core A2P2V functionality (command line based)☆67Updated 9 months ago
- CDIR Analyzer - parsers for data collected by CDIR Collector☆18Updated last year
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆45Updated last year
- VulsRepo is visualized based on the json report output in vuls.☆36Updated 3 years ago
- CVEs <--> Metasploit-Framework modules☆23Updated last week
- A DFIR tool to analyze artifacts on macOS☆33Updated 4 years ago
- API client for crt.sh☆41Updated 4 years ago
- 脆弱性トリアージガイドライン作成の手引き☆27Updated 2 months ago
- Simple SQL Injection Lab: Hands-on guide and Docker setup for exploring MySQL and PostgreSQL injection techniques☆30Updated 2 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Updated 7 years ago
- A DFIR tool to collect artifacts on macOS☆54Updated 5 years ago
- ☆60Updated 10 months ago
- Trivy based vulnerability management service☆55Updated 2 months ago
- A reimplementation of the EtherApe style display for OS X. Note that this is not a fork of EtherApe. Written in a kinder, gentler, age …☆15Updated 6 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆71Updated 10 months ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆108Updated 2 years ago
- ログ分析トレーニング用コンテンツ☆89Updated 4 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆62Updated 11 months ago