vulsio / go-kevLinks
Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.
☆22Updated 2 weeks ago
Alternatives and similar repositories for go-kev
Users that are interested in go-kev are comparing it to the libraries listed below
Sorting:
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆73Updated 2 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆26Updated 3 years ago
- Stakeholder-Specific Vulnerability Categorization☆160Updated this week
- R-CSIRT Linux Triage tool☆39Updated 7 years ago
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆152Updated 2 years ago
- Build a local copy of CPE(Common Platform Enumeration)☆104Updated last week
- Build a local copy of Security Tracker. Notify via E-mail/Slack if there is an update.☆147Updated last week
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆50Updated 2 years ago
- Phishing URL dataset from JPCERT/CC☆183Updated last week
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 2 years ago
- IMAP or SMTP honeypot written in Golang☆25Updated 3 years ago
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Updated 4 years ago
- Cisco Orbital - Osquery queries by Talos☆134Updated last year
- VulsRepo is visualized based on the json report output in vuls.☆35Updated 3 years ago
- A DFIR tool to collect artifacts on macOS☆55Updated 5 years ago
- A DFIR tool to analyze artifacts on macOS☆33Updated 4 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated 2 months ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆76Updated last week
- ☆146Updated 2 months ago
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆24Updated last month
- 高対話型ハニーポット☆27Updated 6 years ago
- simple YARA-based IOC scanner☆169Updated last week
- A repository for possible zgrab2 configurations☆26Updated 2 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆76Updated last week
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆39Updated 4 months ago
- CyRIS: Cyber Range Instantiation System☆104Updated 8 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- Automated handling of data feeds for security teams☆139Updated last month
- Ghidra Script for automated analysis of EMOTET☆17Updated 4 years ago
- ☆120Updated 3 months ago