joshbressers / cve-analysis
Tools for conducting analysis of CVE data in Elasticsearch
☆74Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for cve-analysis
- Vulnerability Information Aggregator for CVEs☆118Updated 5 years ago
- Python wrapper for the API of cve-search☆115Updated 11 months ago
- Externalize Java application access to protected resources as log messages.☆41Updated 6 months ago
- Common Vulnerabilities and Exposures - Portal☆82Updated 7 years ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆64Updated 3 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆121Updated 3 years ago
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆88Updated 6 months ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆97Updated last year
- A repository for OSSEC rules and decoders☆51Updated last year
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆139Updated last week
- ☆53Updated 5 years ago
- Extract files from network traffic with Zeek.☆99Updated 4 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 5 years ago
- General Open Architecture Security Questionnaire☆31Updated last year
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 3 years ago
- How to Zeek Sysmon Logs!☆101Updated 2 years ago
- Zeek IDS Dockerfile☆99Updated last year
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆46Updated 4 years ago
- Evaluation Framework for Dependency Analysis (EFDA)☆42Updated 2 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- Passive DNS collection using Zeek☆181Updated last year
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data