Diviei / nvdapiLinks
The JSON REST API for the National Vulnerability Database
☆24Updated 2 years ago
Alternatives and similar repositories for nvdapi
Users that are interested in nvdapi are comparing it to the libraries listed below
Sorting:
- Python API for the CVSS v3☆58Updated 4 years ago
- Vulnerability Information Aggregator for CVEs☆123Updated 6 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆87Updated 8 months ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆82Updated 8 months ago
- Malware/IOC ingestion and processing engine☆107Updated 6 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated last month
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated last week
- A python wrapper around https://cve.circl.lu.☆55Updated 5 months ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆17Updated 6 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 8 years ago
- Deploy MISP Project software with Vagrant.☆45Updated 5 years ago
- Python wrapper for the API of cve-search☆126Updated last year
- CIFv3 DeploymentKit☆64Updated 5 years ago
- A curated threat modeling library collection☆23Updated last year
- Real Time Threat Monitoring Tool☆113Updated 2 years ago
- Tools for conducting analysis of CVE data in Elasticsearch☆73Updated 3 months ago
- My notes on various topics☆67Updated 2 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- An extensible honeypot framework☆96Updated 3 years ago
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆148Updated 9 months ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆52Updated 6 years ago
- ☆46Updated 8 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆50Updated 2 years ago
- ☆52Updated 7 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 4 years ago