CERTCC / Vulnerability-Data-Archive-Tools
Tools for working with the CERT Vulnerability Data Archive. See also https://github.com/CERTCC/Vulnerability-Data-Archive
☆21Updated 11 months ago
Alternatives and similar repositories for Vulnerability-Data-Archive-Tools:
Users that are interested in Vulnerability-Data-Archive-Tools are comparing it to the libraries listed below
- Plugins written for CVE-Search☆25Updated 4 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆21Updated 9 years ago
- SystemInspector is a script to pull a majority of the security-relevant files and settings from a system.☆18Updated 6 years ago
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆31Updated 10 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- The OVAL Language Sandbox☆44Updated 4 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated last year
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- ☆36Updated 4 years ago
- Maltego transforms for the ThreatCrowd search API☆49Updated 7 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆85Updated 6 years ago
- ☆10Updated 9 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Updated 7 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆11Updated last year
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆92Updated 11 months ago
- ☆15Updated 8 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- Normalizer for honeypot data.☆45Updated 9 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Maltego Transforms to Query Traffic Records☆34Updated 9 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago