PidgeyL / cve-search
cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing of CVEs.
☆25Updated 7 years ago
Alternatives and similar repositories for cve-search:
Users that are interested in cve-search are comparing it to the libraries listed below
- Vulnerability Management tool using the CVE-Search database☆10Updated 8 years ago
- Common Vulnerabilities and Exposures - Portal☆84Updated 7 years ago
- A python wrapper around https://cve.circl.lu.☆55Updated 9 months ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- Nessus Vulnerability visualization for the web☆31Updated 9 years ago
- Plugins written for CVE-Search☆25Updated 3 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 7 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Updated 8 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 5 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Yara intergrated into BurpSuite☆46Updated 8 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆34Updated 3 years ago
- A script to track malware IOCs with OSINT on Twitter.☆53Updated 10 months ago
- ☆15Updated 6 years ago
- DNS zone transfer research☆58Updated 8 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- Cyber Intel Management☆48Updated 7 years ago
- It's like DocBleach, but in your browser☆18Updated 5 years ago
- A set of templates for documenting threat intelligence☆74Updated 12 years ago
- Utility to generate similar IDN domain names☆48Updated 6 years ago
- Legal, procedural and policies document templates for operating an IRT☆64Updated 11 months ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year