cve-search / CveXploreLinks
CveXplore
☆42Updated 2 months ago
Alternatives and similar repositories for CveXplore
Users that are interested in CveXplore are comparing it to the libraries listed below
Sorting:
- Static Token And Credential Scanner☆95Updated 2 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 months ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆21Updated 2 weeks ago
- Tools used by CSIRT and especially in the scope of CNW☆17Updated 5 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆13Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last week
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Tool to guess CPE name based on common software name☆106Updated 2 months ago
- CVE.ICU code.☆49Updated this week
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆83Updated 3 weeks ago
- A rogue DNS detector☆24Updated 2 weeks ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated 2 years ago
- Python client and module for Vulnerability-Lookup.☆14Updated 2 weeks ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- Yet another way to find where to report an abuse☆30Updated 10 months ago
- Polyglot detector☆23Updated 6 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 10 months ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- A simple python library to assist in working with cpes☆19Updated last year
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆46Updated this week
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 2 months ago
- External telegram feeder for AIL framework☆17Updated last week
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- Clone of PDFiD by Didier Stevens, as a package and with some improvements.☆50Updated 9 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆58Updated 2 years ago
- Dependency Combobulator☆94Updated last year
- Python wrapper for the API of cve-search☆127Updated 2 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆18Updated last year