cve-search / VIA4CVE
Vulnerability Information Aggregator for CVEs
☆118Updated 5 years ago
Alternatives and similar repositories for VIA4CVE:
Users that are interested in VIA4CVE are comparing it to the libraries listed below
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆84Updated last week
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆142Updated 2 weeks ago
- Tools for conducting analysis of CVE data in Elasticsearch☆74Updated last week
- Vulnerability Data in ES☆146Updated 7 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆100Updated last year
- A testing framework for mail security and filtering solutions.☆244Updated last year
- Python wrapper for the API of cve-search☆118Updated last year
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆113Updated 4 years ago
- Python abstract API for PassiveTotal services in the form of libraries and command line utilities.☆85Updated last year
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- passivedns-client provides a library and a query tool for querying several passive DNS providers☆199Updated 3 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆142Updated 5 years ago
- Simple REST-style web service for the CVE searching☆97Updated last year
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆92Updated 10 months ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆138Updated 4 years ago
- Python API for the CVSS v3☆58Updated 3 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- ☆202Updated last year
- Code Review Audit Script Scanner☆140Updated last year
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆208Updated 4 years ago
- Internet data acquisition☆149Updated 4 years ago
- CPE: Common Platform Enumeration for Python☆96Updated 5 months ago
- Automated Tactics Techniques & Procedures☆253Updated last year
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆149Updated 10 months ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 5 years ago
- Data Analysis Pipeline☆159Updated last month
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- Legal, procedural and policies document templates for operating an IRT☆64Updated last year
- The Seeker of IOC☆129Updated 4 years ago