Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results
☆16Dec 28, 2018Updated 7 years ago
Alternatives and similar repositories for text2cpe
Users that are interested in text2cpe are comparing it to the libraries listed below
Sorting:
- A Common Platform Enumeration 2.3 implementation for golang.☆18Mar 23, 2019Updated 6 years ago
- ☆23Mar 17, 2024Updated 2 years ago
- ☆14Mar 9, 2023Updated 3 years ago
- Vulners signature-base software version detection rules☆38Nov 9, 2021Updated 4 years ago
- ☆13Apr 16, 2016Updated 9 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆11Nov 13, 2020Updated 5 years ago
- 学习博客☆12Nov 29, 2018Updated 7 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- Generate chart by echarts in nodejs.☆11Jul 29, 2021Updated 4 years ago
- ☆13Nov 8, 2017Updated 8 years ago
- Converting data from services like Censys and Shodan to a common data model☆52Feb 22, 2026Updated 3 weeks ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- Node.js SDK for IBM X-Force Exchange☆15Aug 20, 2018Updated 7 years ago
- RDP auditing script☆17Jul 22, 2025Updated 7 months ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆68Mar 18, 2021Updated 5 years ago
- Index and Search Your Private PDF Collection☆18Jan 16, 2016Updated 10 years ago
- Playback webpages from Wayback Machine☆13Apr 19, 2024Updated last year
- Taws - A personal and private web search engine☆24Feb 20, 2015Updated 11 years ago
- A simple python library to assist in working with cpes☆19Jan 30, 2024Updated 2 years ago
- Matt's DFIR blog☆14Jul 28, 2025Updated 7 months ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆40Oct 9, 2024Updated last year
- Parsing UDP in Elixir with Binary Pattern Matching☆18Jun 5, 2020Updated 5 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 8 years ago
- Scraps for publicly accessible MongoDB instances and dumps user passwords☆33Mar 4, 2016Updated 10 years ago
- ☆14Jan 5, 2021Updated 5 years ago
- Enumerates users based off RDP Screenshots☆36Oct 25, 2023Updated 2 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- 16,432 Free Yara rules created by☆391Jun 1, 2019Updated 6 years ago
- ☆18Jun 8, 2018Updated 7 years ago
- Fast, unopinionated, minimalist browser framework☆13Jan 30, 2025Updated last year
- Stalk whoever you want on Github☆13Feb 7, 2020Updated 6 years ago
- Python port of Boilerpipe library☆16Apr 6, 2018Updated 7 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- A Maltego transform for VirusTotal Submitter Information☆36May 15, 2019Updated 6 years ago
- docker build nessus with unlimited ip☆13Aug 23, 2021Updated 4 years ago
- emotet configs pulled from https://cape.contextis.com/☆15Apr 27, 2022Updated 3 years ago