WiP - cve-search next gen
☆13Jan 18, 2020Updated 6 years ago
Alternatives and similar repositories for cve-search-ng
Users that are interested in cve-search-ng are comparing it to the libraries listed below
Sorting:
- A simple utility to check the status of and/or disable SMBv1 on Windows system via Cb Response's Live Response functionality.☆15May 28, 2019Updated 6 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Apr 15, 2020Updated 5 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 3 years ago
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- Extract useful semantic from CVE descriptions usinig NLP☆25Jan 4, 2023Updated 3 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated 2 years ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago
- RPM packages for MISP☆40Mar 2, 2026Updated last week
- xResolver - Xbox Resolver and PSN Resolver with Gamertag IP Puller☆17Apr 27, 2021Updated 4 years ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆32Aug 6, 2019Updated 6 years ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 8 years ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- a simple discord app token grabber in batch which is fully undetected☆10Aug 9, 2022Updated 3 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated last month
- Machine Learning-based tool for Cybersecurity Risk Assessment☆11Jul 18, 2021Updated 4 years ago
- Herramienta que automatiza el uso del hashcat para crackear contraseñas☆13Oct 23, 2020Updated 5 years ago
- ☆14Feb 11, 2026Updated 3 weeks ago
- Cognite examples and documentation for python.☆15Nov 18, 2020Updated 5 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Apr 15, 2024Updated last year
- CyberSniff Desktop Client☆18Jul 13, 2022Updated 3 years ago
- ☆12Oct 13, 2022Updated 3 years ago
- Et forsøk på å beskrive et minimum av hva en kommune kan forvente av tilgjengelige API operasjoner fra en moderne EPJ system☆14Jun 11, 2025Updated 8 months ago
- New phishing tool with 30+ templates updated tool☆10Feb 2, 2024Updated 2 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- BIM Profiles - Digital Information Exchange Requirements☆11Oct 21, 2020Updated 5 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆24Nov 12, 2025Updated 3 months ago
- ☆10Nov 29, 2025Updated 3 months ago
- Implementing ISO/IEC 27001:2022, by EC-Council☆16Feb 20, 2026Updated 2 weeks ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- ☆15Jul 30, 2022Updated 3 years ago
- ALCON is a code for solving ideal MHD Alfvén continua in tokamaks, using a poloidal-spectral method described in Appendix A in [Nuclear F…☆15Jun 23, 2014Updated 11 years ago
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year