adulau / cve-search
cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing of CVEs.
☆140Updated last week
Alternatives and similar repositories for cve-search:
Users that are interested in cve-search are comparing it to the libraries listed below
- Common Vulnerabilities and Exposures - Portal☆84Updated 7 years ago
- Vulnerability Information Aggregator for CVEs☆118Updated 5 years ago
- Vulnerability Data in ES☆146Updated 7 years ago
- Honeynet Project generic authenticated datafeed protocol☆215Updated last year
- Extract files from network traffic with Zeek.☆100Updated 4 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- ☆75Updated 3 years ago
- Automatic firewall rule orchestator.☆83Updated 7 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆77Updated 7 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 5 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆112Updated 4 years ago
- Miscelaneous useful scripts for my day to day projects☆124Updated 4 years ago
- Python abstract API for PassiveTotal services in the form of libraries and command line utilities.☆85Updated last year
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- ☆112Updated 7 years ago
- Web service for scanning pcaps with snort☆108Updated 6 years ago
- A regex based source code scanner.☆129Updated 7 years ago
- Bro scripts to be shared with the community☆109Updated 11 years ago
- Misc. Bro scripts☆63Updated 7 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 9 years ago
- Next Generation Firewall Audit and Bypass Tool☆263Updated 7 years ago
- ☆169Updated 3 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago
- ☆308Updated 7 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- Scan systems with NMap and parse the output to a list of CVE's, CWE's and DPE's☆274Updated 4 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆142Updated 5 years ago