kaze-technologies / cvefreeLinks
Kaze's openly available CVE vulnerability data.
☆13Updated 2 months ago
Alternatives and similar repositories for cvefree
Users that are interested in cvefree are comparing it to the libraries listed below
Sorting:
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Sniffing out well-known threat groups☆28Updated 10 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 11 months ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆19Updated 8 months ago
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 7 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 6 months ago
- Do bulk whois lookups and get alerted on domains of interest.☆36Updated 10 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆27Updated this week
- ☆10Updated 9 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆52Updated 2 weeks ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 9 months ago
- ☆11Updated last year
- This script is a multi-threaded Okta password sprayer.☆71Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Virtual Security Operations Center☆50Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆51Updated last week
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Manage attack surface data on Elasticsearch☆22Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 8 months ago
- ☆22Updated last week
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated 2 weeks ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 3 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- Script to test NetSec capabilities.☆21Updated 2 years ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆26Updated 7 months ago