joshbressers / cve-analysisLinks
Tools for conducting analysis of CVE data in Elasticsearch
☆74Updated last month
Alternatives and similar repositories for cve-analysis
Users that are interested in cve-analysis are comparing it to the libraries listed below
Sorting:
- Vulnerability Information Aggregator for CVEs☆123Updated 6 years ago
- Python wrapper for the API of cve-search☆126Updated last year
- CPE: Common Platform Enumeration for Python☆96Updated 10 months ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 5 years ago
- ☆45Updated 8 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Updated 3 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆95Updated last year
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆67Updated 4 years ago
- NVD/CVE as JSON files☆121Updated this week
- BSidesSF CTF 2019 release☆71Updated 2 years ago
- Python API for the CVSS v3☆59Updated 4 years ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆143Updated 2 months ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- ☆79Updated 3 years ago
- BSidesCBR CTF docker compose files☆66Updated 5 years ago
- Chef Cookbook which provisions apache+mod_security+owasp-crs☆37Updated 7 years ago
- Resources for CloudNative security research☆32Updated 3 years ago
- General Open Architecture Security Questionnaire☆31Updated 2 years ago
- Passive DNS collection using Zeek☆182Updated 2 years ago
- Evading Snort Intrusion Detection System.☆78Updated 3 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆209Updated 5 years ago
- Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits☆45Updated 3 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆86Updated 5 months ago
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- An extensible honeypot framework☆94Updated 3 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago