PidgeyL / cve-searchLinks
cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing of CVEs.
☆25Updated 8 years ago
Alternatives and similar repositories for cve-search
Users that are interested in cve-search are comparing it to the libraries listed below
Sorting:
- Bro analyzer that detects Google's QUIC protocol☆10Updated 4 years ago
- PhishDetect is a library to help identify phishing pages☆109Updated 2 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆86Updated 4 months ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆81Updated 4 months ago
- Repository of yara rules☆60Updated 2 years ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆94Updated 2 months ago
- Passive DNS V2☆60Updated 11 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆13Updated 7 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆26Updated last year
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 8 years ago
- MISP website (hugo-based)☆24Updated 2 weeks ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated 10 months ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Golang based web service to scan files with yara rules☆26Updated 8 years ago
- Vulnerability Information Aggregator for CVEs☆123Updated 6 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Python API for the CVSS v3☆59Updated 4 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated 3 weeks ago
- An extensible honeypot framework☆93Updated 3 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- Automated handling of data feeds for security teams☆138Updated 3 weeks ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago