vulsio / go-kevLinks
Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.
☆21Updated 2 weeks ago
Alternatives and similar repositories for go-kev
Users that are interested in go-kev are comparing it to the libraries listed below
Sorting:
- R-CSIRT Linux Triage tool☆39Updated 6 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆26Updated 3 years ago
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 2 years ago
- CVEs <--> Metasploit-Framework modules☆25Updated last week
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆24Updated this week
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆49Updated 2 years ago
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Updated 4 years ago
- Stakeholder-Specific Vulnerability Categorization☆153Updated this week
- Build a local copy of CPE(Common Platform Enumeration)☆102Updated last week
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆152Updated 2 years ago
- VulsRepo is visualized based on the json report output in vuls.☆35Updated 3 years ago
- CDIR Analyzer - parsers for data collected by CDIR Collector☆18Updated last year
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆44Updated 2 years ago
- Automatically update IoC for lucky visitor scam☆26Updated 2 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- Ghidra Script for automated analysis of EMOTET☆17Updated 4 years ago
- pocket guide for core detection engineering concepts☆28Updated 2 years ago
- IMAP or SMTP honeypot written in Golang☆25Updated 3 years ago
- A DFIR tool to collect artifacts on macOS☆55Updated 5 years ago
- Website crawler with YARA detection☆88Updated last year
- A DFIR tool to analyze artifacts on macOS☆33Updated 4 years ago
- Yet another way to find where to report an abuse☆32Updated 4 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated this week
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 4 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated last month
- ☆18Updated 3 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated last month
- Vuls Beater for Elasticsearch - connecting vuls☆17Updated 4 years ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆76Updated this week