Diviei / nvdapi
The JSON REST API for the National Vulnerability Database
☆24Updated 2 years ago
Alternatives and similar repositories for nvdapi:
Users that are interested in nvdapi are comparing it to the libraries listed below
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- ☆50Updated 6 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- Malware/IOC ingestion and processing engine☆104Updated 6 years ago
- Python API for the CVSS v3☆58Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- Honeypot repo☆47Updated 9 years ago
- ☆27Updated 7 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆32Updated 2 weeks ago
- Honeypot log processor to create OTX Pulse entries☆29Updated last year
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Snort_rules detection bad actors.☆28Updated 6 months ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆76Updated 2 years ago
- Cyber Intel Management☆48Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- URLCrazy☆31Updated 11 years ago
- Automated Memory Forensic☆35Updated 6 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- CIFv3 DeploymentKit☆63Updated 4 years ago
- A python wrapper around https://cve.circl.lu.☆55Updated 9 months ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆48Updated last year
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Common Vulnerabilities and Exposures - Portal☆84Updated 7 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- ☆44Updated 7 years ago
- ☆22Updated 7 years ago
- ☆24Updated 8 years ago
- Some rules, scripts of some use to us☆9Updated 3 months ago
- Passive DNS V2☆62Updated 10 years ago