cve-search / CveXplore
CveXplore
☆33Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for CveXplore
- Static Token And Credential Scanner☆95Updated last year
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 3 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 4 years ago
- CVE.ICU code.☆34Updated this week
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- An automated setup for fuzzing Redis w/ AFL++☆30Updated 2 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 5 months ago
- Static code search python lib☆18Updated 4 years ago
- Scan pypi for typosquatting☆37Updated last year
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆59Updated 3 weeks ago
- Polyglot detector☆19Updated 7 months ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 2 years ago
- Clone of PDFiD by Didier Stevens, as a package and with some improvements.☆33Updated 8 years ago
- Open YARA scan- and search engine☆17Updated last week
- MUSHIKAGO-femto is an automated penetration testing and first aid tool☆15Updated 2 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆17Updated 3 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆74Updated last year
- Setting up a training environment for MISP☆11Updated last year
- certstream + analytics☆10Updated 4 years ago
- A rogue DNS detector☆23Updated last year
- Exploit, Malware and Vulnerability Scoring Application☆10Updated last year
- Manticore's Public Threats Repository☆10Updated 4 years ago
- This open-source project tracks RED-LILI's activity over time as there are evidence the actor is still active. All information provided h…☆11Updated last year
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆18Updated 4 months ago
- FastCVE - fast, rich and API-based search for CVE and more (CPE, CWE, CAPEC)☆39Updated 3 months ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- Automated Static Analysis Framework☆10Updated 2 years ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated last month
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆13Updated 2 years ago
- Tools for auditing WAFS☆18Updated 2 years ago