cve-search / CveXploreLinks
CveXplore
☆40Updated 2 weeks ago
Alternatives and similar repositories for CveXplore
Users that are interested in CveXplore are comparing it to the libraries listed below
Sorting:
- Polyglot detector☆21Updated 2 weeks ago
- A simple way to exfiltrate data using spotify API☆18Updated last week
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 8 months ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated 2 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Updated 5 months ago
- DEbian Cve REproducer Tool☆25Updated last year
- PyRASP is a Runtime Application Self Protection package for Python-based Web Servers (Flask, FastAPI and Django), Serverless Functions (A…☆33Updated last week
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- External telegram feeder for AIL framework☆13Updated last month
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆70Updated this week
- Cryptovenom: The Cryptography Swiss Army Knife☆9Updated 5 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- CVE.ICU code.☆42Updated this week
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated last year
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- Search for known vulnerabilities in software using software titles or a CPE 2.3 string☆38Updated last week
- This open-source project tracks RED-LILI's activity over time as there are evidence the actor is still active. All information provided h…☆11Updated 2 years ago
- ☆8Updated 3 years ago
- A Python client for the Global CVE Allocation System.☆13Updated this week
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆20Updated 4 years ago
- A rogue DNS detector☆23Updated last year
- Hash collisions and their exploitations☆9Updated 3 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago