cve-search / CveXploreLinks
CveXplore
☆42Updated this week
Alternatives and similar repositories for CveXplore
Users that are interested in CveXplore are comparing it to the libraries listed below
Sorting:
- Static Token And Credential Scanner☆96Updated 2 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- External telegram feeder for AIL framework☆13Updated last week
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆20Updated last month
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 6 months ago
- CVE.ICU code.☆43Updated this week
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆71Updated last month
- Tools used by CSIRT and especially in the scope of CNW☆16Updated last month
- Tool to guess CPE name based on common software name☆101Updated 8 months ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 6 months ago
- A simple python library to assist in working with cpes☆19Updated last year
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 9 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆18Updated last year
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆41Updated last month
- A rogue DNS detector☆23Updated last year
- Automate the regular transfer of AIS data into a MISP Server☆10Updated last year
- Dependency Combobulator☆93Updated last year
- Clone of PDFiD by Didier Stevens, as a package and with some improvements.☆39Updated 9 years ago
- ☆25Updated 2 years ago
- ☆42Updated 3 months ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆57Updated 2 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago