cve-search / CveXploreLinks
CveXplore
☆42Updated 3 weeks ago
Alternatives and similar repositories for CveXplore
Users that are interested in CveXplore are comparing it to the libraries listed below
Sorting:
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated this week
- Static Token And Credential Scanner☆95Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆78Updated 2 years ago
- Tool to guess CPE name based on common software name☆104Updated 2 weeks ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆21Updated 2 weeks ago
- CVE.ICU code.☆46Updated this week
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆80Updated this week
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 11 months ago
- Tools used by CSIRT and especially in the scope of CNW☆17Updated 3 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 3 weeks ago
- Clone of PDFiD by Didier Stevens, as a package and with some improvements.☆42Updated 9 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 8 months ago
- A simple python library to assist in working with cpes☆19Updated last year
- Dependency Combobulator☆93Updated last year
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated 2 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆76Updated last year
- External telegram feeder for AIL framework☆17Updated 2 months ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated last month
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Yet another way to find where to report an abuse☆32Updated 8 months ago
- ☆42Updated 6 months ago
- Python client and module for Vulnerability-Lookup.☆12Updated 2 weeks ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last week
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆43Updated last week
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated 4 months ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆35Updated last week