cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing of CVEs.
☆25May 5, 2017Updated 8 years ago
Alternatives and similar repositories for cve-search
Users that are interested in cve-search are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scan systems with NMap and parse the output to a list of CVE's, CWE's and DPE's☆282Apr 12, 2020Updated 5 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- MISP website (hugo-based)☆25Mar 19, 2026Updated last week
- ☆16Mar 10, 2017Updated 9 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆87Mar 10, 2025Updated last year
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- Debian package build scripts for python-pyvmomi project☆11Apr 20, 2019Updated 6 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 9 years ago
- Vulnerability Management tool using the CVE-Search database☆10Apr 22, 2016Updated 9 years ago
- eSentire additions to the nmap network scanner☆14Mar 29, 2016Updated 9 years ago
- MulVAL is an cybersecurity reasoning engine that can be applied on top of multiple contexts (cloud, IoT, enterprise network, etc )☆11Feb 23, 2016Updated 10 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- Java Library wrapper for Ghidra Headless Analysis + Java Samples☆21Nov 20, 2025Updated 4 months ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- This is the code repository for the paper "Zero-Sum Stochastic Stackelberg Games".☆17Oct 12, 2022Updated 3 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆15Jan 2, 2024Updated 2 years ago
- Identifying and Explaining Similarities in Android Apps☆28Jul 28, 2018Updated 7 years ago
- R package to work with the Shodan API☆18Feb 14, 2018Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆146Feb 20, 2026Updated last month
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Feb 23, 2016Updated 10 years ago
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 7 months ago
- MediaTek MD32 processor module for Ghidra.☆16Apr 10, 2024Updated last year
- BinaryView Plugin for Microcorruption CTF memory dumps☆13Jul 16, 2019Updated 6 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Apr 7, 2023Updated 2 years ago
- ☆12Jul 2, 2020Updated 5 years ago
- ☆16Feb 12, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A python wrapper around https://vulnerability.circl.lu.☆56Mar 13, 2026Updated 2 weeks ago
- Golang Library to interact with your MISP instance☆22Sep 12, 2019Updated 6 years ago
- ☆14Jul 14, 2018Updated 7 years ago
- An Attack Graphs Extension for Draw.io☆17Sep 4, 2025Updated 6 months ago
- PowerShell script to retreive wifi ESSIDs and Passwords.☆26Jul 28, 2017Updated 8 years ago
- Access Control System Software☆13Oct 1, 2020Updated 5 years ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago