PidgeyL / cve-searchLinks
cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing of CVEs.
☆25Updated 8 years ago
Alternatives and similar repositories for cve-search
Users that are interested in cve-search are comparing it to the libraries listed below
Sorting:
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆96Updated 3 weeks ago
- Vulnerability Information Aggregator for CVEs☆124Updated 6 years ago
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- PhishDetect is a library to help identify phishing pages☆109Updated 2 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆87Updated 10 months ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- Passive DNS V2☆60Updated 11 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 6 months ago
- Malware/IOC ingestion and processing engine☆108Updated 7 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 2 months ago
- Core elements of the Modern Honey Network implemented in Docker☆35Updated 3 years ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆81Updated 3 weeks ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- MISP website (hugo-based)☆25Updated 2 weeks ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 4 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆44Updated 8 years ago
- Legal, procedural and policies document templates for operating an IRT☆65Updated last year
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated last year
- Megatron - A System for Abuse- and Incident Handling☆45Updated 8 years ago
- ☆52Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- A script to track malware IOCs with OSINT on Twitter.☆54Updated last year
- brostash: Linux distribution based on Debian and focusing on network security events collection☆33Updated 5 years ago
- Python API for the CVSS v3☆58Updated 4 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Updated 8 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 5 years ago
- Utility to generate similar IDN domain names☆48Updated 7 years ago
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆34Updated 4 years ago
- Security Onion Elastic Stack☆46Updated 5 years ago