vulsio / go-kevLinks
Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.
☆22Updated last month
Alternatives and similar repositories for go-kev
Users that are interested in go-kev are comparing it to the libraries listed below
Sorting:
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆73Updated 2 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆26Updated 3 years ago
- Stakeholder-Specific Vulnerability Categorization☆158Updated this week
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆152Updated 2 years ago
- Build a local copy of CPE(Common Platform Enumeration)☆104Updated last month
- R-CSIRT Linux Triage tool☆39Updated 7 years ago
- Phishing URL dataset from JPCERT/CC☆181Updated 3 months ago
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆50Updated 2 years ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 2 years ago
- VulsRepo is visualized based on the json report output in vuls.☆35Updated 3 years ago
- CVEs <--> Metasploit-Framework modules☆25Updated last month
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- Automatically update IoC for lucky visitor scam☆26Updated 3 months ago
- VulnCheck's official command line tool☆135Updated 2 weeks ago
- Build a local copy of Security Tracker. Notify via E-mail/Slack if there is an update.☆146Updated last month
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Updated 4 years ago
- A DFIR tool to analyze artifacts on macOS☆33Updated 4 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆76Updated this week
- Mirror of cisa.gov/kev data files☆52Updated last week
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆84Updated this week
- API client for crt.sh☆41Updated 4 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆71Updated last month
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- pocket guide for core detection engineering concepts☆29Updated 2 years ago
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆24Updated 3 weeks ago
- ログ分析トレーニング用コンテンツ☆93Updated 5 years ago
- ☆120Updated 3 months ago
- ☆119Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week