clearbluejar / cve-markdown-charts
A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.
☆43Updated 2 years ago
Alternatives and similar repositories for cve-markdown-charts:
Users that are interested in cve-markdown-charts are comparing it to the libraries listed below
- Malware Analysis tools☆26Updated 7 months ago
- ELF Sectional docking payload injector system☆21Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆40Updated last year
- Tools that trigger False Positive AV alerts☆48Updated 4 months ago
- ☆18Updated last year
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆37Updated 3 weeks ago
- Dont Gamble with Risk☆14Updated last year
- ☆52Updated 6 months ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆53Updated last year
- Lazarus analysis tools and research report☆56Updated last year
- ☆61Updated 9 months ago
- ☆27Updated 3 years ago
- Winbindex bot to pull in binaries for specific releases☆47Updated last year
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Updated last year
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- ☆42Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆46Updated 3 years ago
- ☆37Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Updated 5 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated last year
- Recreation of most of the Raccoon Infostealer's functionality, true to threat intelligence, for safe testing in organizational environmen…☆17Updated last year
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆50Updated last month
- ☆15Updated 2 years ago
- AI fun☆24Updated last month
- ☆69Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 2 months ago