joshbressers / cve-analysisView external linksLinks
Tools for conducting analysis of CVE data in Elasticsearch
☆73Jul 23, 2025Updated 6 months ago
Alternatives and similar repositories for cve-analysis
Users that are interested in cve-analysis are comparing it to the libraries listed below
Sorting:
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- 第二届阿里云安全算法挑战赛☆16May 11, 2018Updated 7 years ago
- Recurrent neural networks in predicting security exploits☆22Sep 22, 2016Updated 9 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- This is a mapping of CPEs to package urls created by using VulnerableCode's data☆10Aug 14, 2020Updated 5 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- SoC-independent part of the iso7816 stack☆13Feb 28, 2024Updated last year
- 聚合交易平台BitLeague☆11Sep 30, 2018Updated 7 years ago
- 基于Opendaylight的packet-in flooding攻击的防护☆11Mar 25, 2019Updated 6 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- cobalt strike 自用脚本☆29Oct 29, 2020Updated 5 years ago
- some java code i met or i used☆29May 7, 2019Updated 6 years ago
- notes about GNNs☆11Apr 8, 2019Updated 6 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆96May 14, 2024Updated last year
- 基于attention的CNN文本分类☆15Dec 8, 2022Updated 3 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- A machine learning approach to detect phishing urls☆30Jul 13, 2022Updated 3 years ago
- Materials from Fuzzing Bay Area meetups☆57Dec 23, 2019Updated 6 years ago
- An intentionally designed broken web application based on REST API☆13May 25, 2022Updated 3 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- Tools released in CSS 2019☆38Aug 1, 2019Updated 6 years ago
- ELK Stack for pfSense and Suricata, optimized for Synology NAS☆18Jun 16, 2018Updated 7 years ago
- Reconnaissance Test for Kubernetes.☆11Aug 13, 2024Updated last year
- Workshop material for a Windows Attack Surface Analysis Workshop☆68May 1, 2019Updated 6 years ago
- ☆23Apr 6, 2019Updated 6 years ago
- Exploit for PlaySMS 1.4 authenticated RCE☆14Nov 6, 2018Updated 7 years ago
- webshell and nonwebshell samples,which can be used to train machine learning models to detect webshell☆43Apr 13, 2019Updated 6 years ago
- A tool to investigate Dependency Confusion in Artifactory☆24May 15, 2025Updated 9 months ago
- Browser Fuzzing with Machine Learning☆22Mar 6, 2019Updated 6 years ago
- Repo for proof of concept exploits and tools.☆56Oct 15, 2020Updated 5 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- A Java serializer in JavaScript☆81May 21, 2018Updated 7 years ago