A vulnerability assessment tool for system models
☆13Oct 1, 2021Updated 4 years ago
Alternatives and similar repositories for cybok-cli
Users that are interested in cybok-cli are comparing it to the libraries listed below
Sorting:
- A security dashboard for analyzing cyber-physical system designs☆17Oct 1, 2021Updated 4 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 2 months ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 5 months ago
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 8 months ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Aug 14, 2025Updated 6 months ago
- ☆14May 30, 2018Updated 7 years ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Dec 27, 2021Updated 4 years ago
- A preservation experiment to save photos from Flickr to your disk with the metadata embedded.☆17Mar 23, 2025Updated 11 months ago
- eBPF Sockmap Proxy☆16Mar 5, 2022Updated 4 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated last week
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Turn an image into a sequence of sounds using a Hilbert Curve.☆14Feb 12, 2023Updated 3 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations