NIST-based CVE lookup store and API powered by Rust.
☆135Sep 17, 2025Updated 5 months ago
Alternatives and similar repositories for kepler
Users that are interested in kepler are comparing it to the libraries listed below
Sorting:
- ☆15Oct 29, 2024Updated last year
- A modular and blazing fast runtime security tool for the IoT, powered by eBPF.☆1,004Dec 9, 2025Updated 2 months ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- ☆15Sep 4, 2024Updated last year
- Tool for profiling heap usage and memory management☆27Oct 31, 2021Updated 4 years ago
- Best practice configuration for Linux auditd for CIS and STIG standards, enhanced with LOTL detection rules.☆14Dec 6, 2025Updated 3 months ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Python3 Websocket AND http proxy☆43Dec 18, 2022Updated 3 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- MultiStep MCP That Returns CVE Information With EPSS Score☆13May 22, 2025Updated 9 months ago
- ☆32Feb 14, 2026Updated 2 weeks ago
- Easy sandboxing for rust☆11Jun 19, 2016Updated 9 years ago
- minimal lisp that compiles to x86☆10Mar 19, 2017Updated 8 years ago
- A Spicy protocol analyzer for WireGuard☆29Aug 11, 2020Updated 5 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- misc scripts/utils that I've written that aren't deserving of own repos.☆14Aug 18, 2021Updated 4 years ago
- Crawl (~600K) labeled Portable Exe files from Microsoft Cabs☆14Jul 31, 2021Updated 4 years ago
- Vulnerabilities advisories and PoC☆18Nov 21, 2025Updated 3 months ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆14Feb 16, 2021Updated 5 years ago
- Spot all domain controllers in a Microsoft Active Directory environment. Find computer name, FQDN, and IP address(es) of all DCs.☆19Jun 23, 2024Updated last year
- ☆20Feb 6, 2024Updated 2 years ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 3 weeks ago
- ☆28Mar 29, 2022Updated 3 years ago
- huaweictf2020-xctf高校网络安全挑战赛☆17Dec 28, 2020Updated 5 years ago
- Cyber threat intelligence crates for Rust☆16Jan 22, 2024Updated 2 years ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆25Sep 29, 2024Updated last year
- Kubernetes Easter CTF☆59Jul 10, 2020Updated 5 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102May 13, 2022Updated 3 years ago
- A sandboxed Python subset for safe evaluation☆32Jun 28, 2022Updated 3 years ago
- Static code analysis test source code☆36Aug 30, 2023Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- A disassembler framework☆19Sep 16, 2022Updated 3 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Jul 17, 2024Updated last year
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Kerberoast Detection Script☆30Oct 31, 2024Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Aug 30, 2022Updated 3 years ago
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- ☆12Nov 21, 2023Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆118Dec 13, 2023Updated 2 years ago