Tools for conducting analysis of CVE data in Elasticsearch
☆74Jul 23, 2025Updated 7 months ago
Alternatives and similar repositories for cve-analysis
Users that are interested in cve-analysis are comparing it to the libraries listed below
Sorting:
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- Recurrent neural networks in predicting security exploits☆22Sep 22, 2016Updated 9 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- SoC-independent part of the iso7816 stack☆13Feb 28, 2024Updated 2 years ago
- This is a mapping of CPEs to package urls created by using VulnerableCode's data☆10Aug 14, 2020Updated 5 years ago
- 聚合交易平台BitLeague☆11Sep 30, 2018Updated 7 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- cobalt strike 自用脚本☆29Oct 29, 2020Updated 5 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- notes about GNNs☆11Apr 8, 2019Updated 6 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- 基于attention的CNN文本分类☆15Dec 8, 2022Updated 3 years ago
- A machine learning approach to detect phishing urls☆30Jul 13, 2022Updated 3 years ago
- Materials from Fuzzing Bay Area meetups☆57Dec 23, 2019Updated 6 years ago
- An intentionally designed broken web application based on REST API☆13May 25, 2022Updated 3 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- Tools released in CSS 2019☆38Aug 1, 2019Updated 6 years ago
- Run fuzzing experiments in Docker☆101Mar 17, 2021Updated 4 years ago
- ELK Stack for pfSense and Suricata, optimized for Synology NAS☆18Jun 16, 2018Updated 7 years ago
- Workshop material for a Windows Attack Surface Analysis Workshop☆68May 1, 2019Updated 6 years ago
- Exploit for PlaySMS 1.4 authenticated RCE☆14Nov 6, 2018Updated 7 years ago
- ☆23Apr 6, 2019Updated 6 years ago
- webshell and nonwebshell samples,which can be used to train machine learning models to detect webshell☆43Apr 13, 2019Updated 6 years ago
- A tool to investigate Dependency Confusion in Artifactory☆24May 15, 2025Updated 9 months ago
- Repo for proof of concept exploits and tools.☆56Oct 15, 2020Updated 5 years ago
- Extract useful semantic from CVE descriptions usinig NLP☆25Jan 4, 2023Updated 3 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- phpstudy get shell☆23Jan 1, 2016Updated 10 years ago
- A Java serializer in JavaScript☆80May 21, 2018Updated 7 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago