clearbluejar / cve-markdown-chartsLinks
A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.
☆45Updated 2 years ago
Alternatives and similar repositories for cve-markdown-charts
Users that are interested in cve-markdown-charts are comparing it to the libraries listed below
Sorting:
- Tools for offensive security of NetBackup infrastructures☆42Updated 2 years ago
- ELF Sectional docking payload injector system☆21Updated 3 years ago
- Malware Analysis tools☆26Updated last year
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 2 years ago
- Tools that trigger False Positive AV alerts☆53Updated 10 months ago
- Public repository for Red Canary Research☆37Updated 5 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- ☆37Updated 3 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 3 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- ☆31Updated 4 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆95Updated 2 weeks ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆45Updated 2 years ago
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆28Updated 2 years ago
- ☆43Updated 3 years ago
- 2022 CTF public release☆23Updated 3 years ago
- ☆64Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆29Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆46Updated 3 years ago
- ☆48Updated last year
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆28Updated 2 weeks ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago