A CVE Heatmap Using CalPlot
☆97Jan 25, 2021Updated 5 years ago
Alternatives and similar repositories for CVEHeatMap
Users that are interested in CVEHeatMap are comparing it to the libraries listed below
Sorting:
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- A tool to assist with network-based hunting for GRU's Drovorub malware c2☆25Aug 28, 2020Updated 5 years ago
- ☆49Updated this week
- Network Traffic Fuzzer☆17Dec 28, 2024Updated last year
- CVE.ICU code.☆51Updated this week
- python SDK for CIFv2☆13Nov 5, 2019Updated 6 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- A command based package for simple display of statistics☆25Dec 2, 2024Updated last year
- A curated GitHub repository that's in-scope and eligible for bounty.☆21Aug 10, 2022Updated 3 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- Monthly CVE Stats☆44Updated this week
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 6 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Apr 10, 2019Updated 6 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 9 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- Resources I've found useful for my CTI work☆12Dec 27, 2023Updated 2 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago