cve-search / Plugins
Plugins written for CVE-Search
☆25Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Plugins
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 2 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- This repository is a curated list of pro bono incident response entities.☆19Updated last year
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆40Updated 4 years ago
- Artefacts from various retefe campaigns☆10Updated 5 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Extract information from MISP via the API☆15Updated 8 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated last month
- Maltego Transform to put entities into MISP events☆26Updated 3 years ago
- API Tools☆27Updated 8 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Updated 7 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Updated 6 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Updated 9 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 4 years ago
- Maltego Transforms to Query Traffic Records☆33Updated 9 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- General scripts for random stuff☆38Updated 3 years ago
- Megatron - A System for Abuse- and Incident Handling☆41Updated 7 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- Tools to work with vulnerability standards.☆19Updated 10 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆40Updated 6 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago