CveXplore
☆41Apr 20, 2026Updated 2 weeks ago
Alternatives and similar repositories for CveXplore
Users that are interested in CveXplore are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NVD API 2.0 client for CVE information☆14May 15, 2025Updated 11 months ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- A pure python rpm reader☆20Apr 11, 2024Updated 2 years ago
- Service to scan licenses from source code☆12Aug 14, 2023Updated 2 years ago
- Python client and module for Vulnerability-Lookup.☆16Apr 28, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Tool to guess CPE name based on common software name☆121Apr 15, 2026Updated 3 weeks ago
- A library for parsing security advisories☆13Apr 13, 2026Updated 3 weeks ago
- Vulnerability Information Aggregator for CVEs☆124Jun 13, 2019Updated 6 years ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆512Apr 30, 2026Updated last week
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated last year
- Open Source testing framework for image correlation, distance and analysis☆44May 2, 2023Updated 3 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆87Mar 10, 2025Updated last year
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆36Jan 8, 2026Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- A Python dependency resolver☆25Apr 27, 2026Updated last week
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- ☆12Jun 6, 2025Updated 11 months ago
- Vulnogram is the tool for reserving, managing, and publishing CVEs. Get started at vulnogram.org or deploy Docker edition for full enterp…☆220Apr 27, 2026Updated last week
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year
- An index data structure for approximate string search.☆23May 6, 2019Updated 7 years ago
- AIL project training materials☆39Apr 21, 2026Updated 2 weeks ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Limier est un petit outil en CLI permettant de trouver un flux RSS quand il est planqué sur un site.☆19Aug 6, 2023Updated 2 years ago
- ☆44Jul 11, 2025Updated 9 months ago
- Scripts as a service. Builds on systemd (for Linux)☆21Mar 10, 2026Updated last month
- Scape firmware metadata from 18 vendors and download corresponding firmware images. Save in MySQL database for InfoSec research purposes.☆12Feb 17, 2023Updated 3 years ago
- tools for creating, inspecting and modifying torrent files☆13Jun 1, 2022Updated 3 years ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- Low-effort reachability analysis for third-party code vulnerabilities.☆22Jul 11, 2023Updated 2 years ago
- ☆11Nov 12, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last month
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Oct 30, 2023Updated 2 years ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- Python bindings for libsrcml☆17Aug 25, 2025Updated 8 months ago
- Common Exercise Format - CEXF☆11Aug 15, 2024Updated last year
- Python wrapper for the API of cve-search☆127Dec 5, 2023Updated 2 years ago