fedoraredteam / rpm2cpeLinks
rpm2cpe translates package names to CPE values.
☆11Updated 8 years ago
Alternatives and similar repositories for rpm2cpe
Users that are interested in rpm2cpe are comparing it to the libraries listed below
Sorting:
- Vulnerability Information Aggregator for CVEs☆122Updated 6 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆143Updated 4 months ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆86Updated 7 months ago
- a network packet capture compiler☆202Updated 3 years ago
- CyRIS: Cyber Range Instantiation System☆105Updated 10 months ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- A tool for analyzing firewall rules☆157Updated 7 years ago
- ☆75Updated 3 years ago
- ☆83Updated 2 years ago
- Application for STIX v2.0 objects management and analysis☆27Updated 7 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- Open source tools for realistic-behaving electric grid honeynets☆57Updated 10 years ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- A python wrapper around https://cve.circl.lu.☆55Updated 4 months ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆90Updated last year
- ☆280Updated 2 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆274Updated 2 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 9 years ago
- Python abstract API for PassiveTotal services in the form of libraries and command line utilities.☆85Updated 2 years ago
- A utility repo to assist with converting between MISP and STIX formats☆69Updated 4 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- The Seeker of IOC☆130Updated 5 years ago
- STIX Visualization Tool☆109Updated 7 years ago
- Detecting Lateral Movement with Machine Learning☆138Updated 7 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Updated last year
- Extract files from network traffic with Zeek.☆102Updated 5 years ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆67Updated 4 years ago
- ☆174Updated 4 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- Automated Use Case Testing☆169Updated 7 years ago