clearbluejar / cve-markdown-chartsLinks
A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.
☆43Updated 2 years ago
Alternatives and similar repositories for cve-markdown-charts
Users that are interested in cve-markdown-charts are comparing it to the libraries listed below
Sorting:
- Malware Analysis tools☆26Updated 9 months ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Tools that trigger False Positive AV alerts☆50Updated 6 months ago
- Lazarus analysis tools and research report☆56Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- ☆18Updated last year
- ELF Sectional docking payload injector system☆21Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆83Updated last year
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆57Updated 3 weeks ago
- Surface Analysis System on Cloud☆19Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆28Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆66Updated last year
- ☆33Updated 3 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆62Updated last year
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆46Updated 3 years ago
- A Golang CLI for the MITRE ATT&CK Framework☆12Updated last month
- Continuous kerberoast monitor☆45Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- Simple WebSocket fuzzer☆33Updated 2 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆18Updated 4 months ago
- ☆62Updated 11 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆15Updated 2 years ago