PidgeyL / cve-searchLinks
cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing of CVEs.
☆25Updated 8 years ago
Alternatives and similar repositories for cve-search
Users that are interested in cve-search are comparing it to the libraries listed below
Sorting:
- Vulnerability Management tool using the CVE-Search database☆10Updated 9 years ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Nessus Vulnerability visualization for the web☆30Updated 9 years ago
- Plugins written for CVE-Search☆25Updated 4 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- Homographs: brutefind homographs within a font☆18Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 6 years ago
- A set of templates for documenting threat intelligence☆74Updated 12 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- Lootbox downloads open directories shared on Twitter.☆35Updated 4 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆85Updated 3 months ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Spam trap management☆23Updated last year
- Golang based web service to scan files with yara rules☆26Updated 7 years ago
- Combining OSINT sources in Elastic Stack☆80Updated 4 years ago
- Passive DNS V2☆60Updated 11 years ago
- Credential Phish Analysis and Automation☆97Updated 6 years ago