gcve-eu / gcveView external linksLinks
A Python client for the Global CVE Allocation System.
☆17Jan 31, 2026Updated 2 weeks ago
Alternatives and similar repositories for gcve
Users that are interested in gcve are comparing it to the libraries listed below
Sorting:
- Python framework to solve crypto problems using grainofsalt and cryptominisat☆14May 24, 2022Updated 3 years ago
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Jan 16, 2026Updated 3 weeks ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 8 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Jun 20, 2022Updated 3 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆19Feb 16, 2018Updated 7 years ago
- ☆42Apr 5, 2025Updated 10 months ago
- Python bindings for the Zydis disassembler library☆17Jul 2, 2019Updated 6 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- Stochastic Traffic Factoring Utility☆15Nov 5, 2016Updated 9 years ago
- Gather information on Wiki contributions from IP ranges☆23Jan 21, 2018Updated 8 years ago
- BCP documents and website of GCVE☆55Updated this week
- Another MISP module for Python☆18Feb 17, 2020Updated 5 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- A simple python library to assist in working with cpes☆19Jan 30, 2024Updated 2 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆26Nov 19, 2020Updated 5 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Parses DNS responses in a secure, rigorous manner☆22Jul 24, 2020Updated 5 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Ops-Trust Platform - Portal☆21Aug 5, 2016Updated 9 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Jan 15, 2022Updated 4 years ago
- A collaborative platform for creating, editing and sharing JSON objects.☆75Jan 22, 2026Updated 3 weeks ago
- yara rules for cryptography detection☆30Apr 28, 2014Updated 11 years ago
- Diff tool for comparing export tables in PE images☆24Mar 4, 2020Updated 5 years ago
- You're busted!☆27Dec 16, 2019Updated 6 years ago
- An Exploration into Graph Databases☆28Oct 7, 2015Updated 10 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆118Updated this week
- AFF4 Standard Documents☆29Feb 4, 2022Updated 4 years ago
- Accent Classification in Speech☆25Jul 24, 2019Updated 6 years ago
- Sandbox samples and monitor them with kunai☆29Jun 24, 2025Updated 7 months ago