joshbressers / cve-analysisLinks
Tools for conducting analysis of CVE data in Elasticsearch
☆74Updated last month
Alternatives and similar repositories for cve-analysis
Users that are interested in cve-analysis are comparing it to the libraries listed below
Sorting:
- Vulnerability Information Aggregator for CVEs☆121Updated 6 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- Python wrapper for the API of cve-search☆122Updated last year
- Externalize Java application access to protected resources as log messages.☆41Updated last week
- General Open Architecture Security Questionnaire☆31Updated last year
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- Python API for the CVSS v3☆59Updated 4 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆85Updated 3 months ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆66Updated 4 years ago
- Vendor-Neutral Security Tool Automation Controller (over REST)☆28Updated 5 years ago
- Evaluation Framework for Dependency Analysis (EFDA)☆43Updated 3 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits☆45Updated 3 years ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 4 years ago
- A python script that a) parses NIST NVD CVEs, b) prcoesses and exports them to CSV files, c) creates a postgres database and imports all …☆76Updated 3 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆47Updated 4 years ago
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆94Updated last year
- CVE.ICU code.☆42Updated this week
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆31Updated 2 years ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- Vulnerability Data in ES☆146Updated 7 years ago
- An extensible honeypot framework☆93Updated 2 years ago
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- SysFlow documentation and issues tracker☆46Updated 8 months ago
- Black Hat EU 2018 - Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence☆22Updated 6 years ago