Docker Image for CVE-Search
☆119Feb 21, 2025Updated last year
Alternatives and similar repositories for CVE-Search-Docker
Users that are interested in CVE-Search-Docker are comparing it to the libraries listed below
Sorting:
- CveXplore☆42Sep 12, 2025Updated 6 months ago
- Dockerized cve-search as a web app☆16Dec 18, 2017Updated 8 years ago
- Python wrapper for the API of cve-search☆127Dec 5, 2023Updated 2 years ago
- Tool to guess CPE name based on common software name☆117Feb 11, 2026Updated last month
- OSS License Open Data☆12Jun 28, 2019Updated 6 years ago
- OSS License Simple Viewer is a simple Excel-based tool as OSS license reference for engineers.☆14Nov 20, 2020Updated 5 years ago
- Scan systems with NMap and parse the output to a list of CVE's, CWE's and DPE's☆283Apr 12, 2020Updated 5 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- This is a mapping of CPEs to package urls created by using VulnerableCode's data☆10Aug 14, 2020Updated 5 years ago
- Vulnerability Management with SBOM☆20Updated this week
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14May 23, 2020Updated 5 years ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 3 months ago
- Discovery will gather DNS entry, subdomains and domains linked, all files publicly exposed to gather metadatas, check for dumps on Pasteb…☆14Mar 18, 2019Updated 7 years ago
- Vulnerability Information Aggregator for CVEs☆124Jun 13, 2019Updated 6 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- Utility that provides an API and CLI to identify licenses and legal terms☆52Jul 11, 2025Updated 8 months ago
- ☆25Nov 8, 2024Updated last year
- Binary Analysis Next Generation (BANG)☆519Updated this week
- KaliAI is an advanced AI assistant designed to help security professionals and ethical hackers leverage Kali Linux tools effectively and …☆23Mar 25, 2025Updated 11 months ago
- Vulnerability management tool that provides Yocto SBOM generation and CVE Analysis of target images.☆38Updated this week
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Dec 23, 2022Updated 3 years ago
- The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 350 common, vulnera…☆1,641Updated this week
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- sbomasm: The Complete SBOM Management Toolkit☆106Updated this week
- Examples and proof-of-concept for Software Bill of Materials (SBOM) code & data☆67Apr 8, 2024Updated last year
- CentOS 6.9 build Docker environment to distribute portable Linux binaries☆13Dec 28, 2021Updated 4 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated last month
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Oct 7, 2015Updated 10 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- SMTP Server Tester, by Alton Johnson (alton.jx@gmail.com)☆19Jul 3, 2015Updated 10 years ago
- GDT (Ghidra Data Type) generated from IDA tils☆22Mar 10, 2023Updated 3 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated last year
- SPDX Command Line Tools using the Spdx-Java-Library☆90Mar 13, 2026Updated last week
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Basic implementation of certstream to print new subdomains and domains☆36Jul 6, 2021Updated 4 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- WiiBin is a framework to determine architecture of an unknown binary and locate opcode sections within the same binary via supervised mac…☆20Dec 16, 2025Updated 3 months ago