kaze-technologies / cvefreeLinks
Kaze's openly available CVE vulnerability data.
☆14Updated 4 months ago
Alternatives and similar repositories for cvefree
Users that are interested in cvefree are comparing it to the libraries listed below
Sorting:
- Shodan Monitoring integration for TheHive.☆131Updated 8 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆56Updated this week
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Data from Dark Web Marketplace scraping - Be careful☆40Updated 9 months ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆117Updated 3 months ago
- A go-exploit to scan for implanted Cisco IOS XE Systems☆41Updated 10 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆34Updated 8 months ago
- Signature based honeypot detector tool written in Golang☆102Updated 5 months ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 11 months ago
- ☆23Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Sniffing out well-known threat groups☆52Updated last year
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆19Updated 10 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆44Updated 2 months ago
- URL fingerprinting made easy☆89Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆127Updated 3 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated last week
- Some of my rough notes for Docker threat detection☆47Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated 9 months ago
- Citrix Scanner for CVE-2023-3519☆51Updated 2 years ago
- Tool to discover external and internal network attack surface☆203Updated last year
- ☆21Updated 2 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆20Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago