PidgeyL / cve-searchLinks
cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing of CVEs.
☆24Updated 8 years ago
Alternatives and similar repositories for cve-search
Users that are interested in cve-search are comparing it to the libraries listed below
Sorting:
- PhishDetect is a library to help identify phishing pages☆109Updated 2 years ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆95Updated last week
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆87Updated 9 months ago
- Vulnerability Information Aggregator for CVEs☆124Updated 6 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆82Updated last week
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Updated 2 years ago
- Passive DNS V2☆60Updated 11 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 5 months ago
- Utility for parsing Bro log files into CSV or JSON format☆42Updated 2 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆114Updated 6 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Updated 8 years ago
- Automated handling of data feeds for security teams☆145Updated 2 months ago
- Legal, procedural and policies document templates for operating an IRT☆65Updated last year
- Python API for the CVSS v3☆58Updated 4 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆44Updated 8 years ago
- A lightweight tool to score network traffic and flag anomalies☆123Updated last year
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated last month
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 9 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Updated 4 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Updated 2 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 months ago
- Malware/IOC ingestion and processing engine☆108Updated 7 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago