barnumbirr / ares
A python wrapper around https://cve.circl.lu.
☆55Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for ares
- Common Vulnerabilities and Exposures - Portal☆82Updated 7 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆43Updated 3 years ago
- Deploy MISP Project software with Vagrant.☆42Updated 4 years ago
- General scripts for random stuff☆38Updated 3 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆30Updated last year
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆139Updated last week
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆76Updated 3 weeks ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- Create complex tools execution Workflows for working together☆22Updated 3 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆24Updated 7 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 6 years ago
- The JSON REST API for the National Vulnerability Database☆24Updated last year
- Plugins written for CVE-Search☆25Updated 3 years ago
- Python wrapper for the API of cve-search☆115Updated 11 months ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Vulnerability Data in ES☆146Updated 7 years ago
- Vulnerability Information Aggregator for CVEs☆118Updated 5 years ago
- Utility to generate similar IDN domain names☆47Updated 6 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Nessus Vulnerability visualization for the web☆31Updated 8 years ago
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆26Updated 9 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆83Updated 5 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- ☆50Updated 6 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆37Updated 4 years ago
- Automatic firewall rule orchestator.☆82Updated 7 years ago
- ☆24Updated 4 years ago