cve-search / CveXplore
CveXplore
☆36Updated last week
Alternatives and similar repositories for CveXplore:
Users that are interested in CveXplore are comparing it to the libraries listed below
- Static Token And Credential Scanner☆96Updated last year
- Polyglot detector☆21Updated 11 months ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆63Updated last month
- CVE.ICU code.☆39Updated this week
- A simple way to exfiltrate data using spotify API☆18Updated last week
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- Scan pypi for typosquatting☆38Updated 2 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated last year
- An automated setup for fuzzing Redis w/ AFL++☆33Updated 3 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆56Updated last month
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆100Updated last year
- Open YARA scan- and search engine☆20Updated 2 weeks ago
- Static code search python lib☆18Updated 4 years ago
- External telegram feeder for AIL framework☆13Updated last month
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated last year
- Exploit, Malware and Vulnerability Scoring Application☆11Updated last year
- Manticore's Public Threats Repository☆10Updated 4 years ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆43Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆39Updated last month
- CyCAT.org API back-end server including crawlers☆30Updated 2 years ago
- Do You Know What's In Your Python Packages? A Tool for Visualizing Python Package Registry Security Audit Data☆19Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- ☆22Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Using EPUBs for the semi-automated evaluation of security and privacy implications of EPUB reading systems.☆31Updated 2 years ago