cve-search / CveXplore
CveXplore
☆35Updated 2 weeks ago
Alternatives and similar repositories for CveXplore:
Users that are interested in CveXplore are comparing it to the libraries listed below
- Polyglot detector☆21Updated 10 months ago
- Static Token And Credential Scanner☆96Updated last year
- An automated setup for fuzzing Redis w/ AFL++☆33Updated 2 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- CVE.ICU code.☆39Updated this week
- Hash collisions and their exploitations☆9Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- The Dumb Network Fuzzer☆19Updated last year
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆61Updated last week
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆43Updated 2 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- Scapy hands-on☆35Updated last year
- A rogue DNS detector☆23Updated last year
- A curated list of argument injection vectors☆40Updated 3 weeks ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated last year
- A simple way to exfiltrate data using spotify API☆18Updated last week
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆17Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆39Updated 2 weeks ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- ☆8Updated 3 years ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆40Updated last week
- HN Security's advisories.☆21Updated 3 months ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated 9 months ago
- Advanced threat detection solution for Linux.☆36Updated 4 years ago
- DFF (Digital Forensics Framework)☆10Updated 4 years ago