fedoraredteam / rpm2cpe
rpm2cpe translates package names to CPE values.
☆11Updated 7 years ago
Alternatives and similar repositories for rpm2cpe:
Users that are interested in rpm2cpe are comparing it to the libraries listed below
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆49Updated last year
- Tools for conducting analysis of CVE data in Elasticsearch☆74Updated 3 weeks ago
- Vulnerability Information Aggregator for CVEs☆119Updated 5 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆84Updated last month
- SANS Hunting on the Cheap☆35Updated 8 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆38Updated 9 years ago
- ☆75Updated 3 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆17Updated 6 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆142Updated 2 weeks ago
- Bro scripts to be shared with the community☆109Updated 12 years ago
- Various Modules & Scripts for use with Viper Framework☆27Updated 5 years ago
- Passive DNS V2☆61Updated 11 years ago
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- CuckooMX is a project to automate analysis of files transmitted over SMTP (using the Cuckoo sandbox)☆41Updated 12 years ago
- **BETA** A simple buildscript for network security monitoring on RHEL/CentOS☆31Updated 8 years ago
- Honeypot repo☆48Updated 9 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago
- Application for STIX v2.0 objects management and analysis☆27Updated 7 years ago
- ☆38Updated 6 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated last year
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆89Updated 11 months ago
- STIX Visualization Tool☆108Updated 6 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- CIFv3 DeploymentKit☆64Updated 4 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Updated last year
- Some IR notes☆73Updated 8 years ago
- A script to track malware IOCs with OSINT on Twitter.☆53Updated 11 months ago
- ☆33Updated 4 years ago