cve-search / CveXploreLinks
CveXplore
☆43Updated last week
Alternatives and similar repositories for CveXplore
Users that are interested in CveXplore are comparing it to the libraries listed below
Sorting:
- Static Token And Credential Scanner☆96Updated 2 years ago
- CVE.ICU code.☆46Updated this week
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆21Updated last week
- Tools used by CSIRT and especially in the scope of CNW☆16Updated last month
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆76Updated last week
- Tool to guess CPE name based on common software name☆101Updated 2 weeks ago
- External telegram feeder for AIL framework☆13Updated last month
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆18Updated last year
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 6 months ago
- Monthly CVE Stats☆43Updated 3 weeks ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated this week
- A rogue DNS detector☆23Updated 2 weeks ago
- Polyglot detector☆22Updated 2 months ago
- Yet another way to find where to report an abuse☆32Updated 7 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 10 months ago
- ☆28Updated 2 months ago
- Clone of PDFiD by Didier Stevens, as a package and with some improvements.☆39Updated 9 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- External twitter feeder for AIL framework☆16Updated 2 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆128Updated 2 weeks ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆33Updated this week
- ☆42Updated 4 months ago
- A simple python library to assist in working with cpes☆19Updated last year