kaze-technologies / cvefreeLinks
Kaze's openly available CVE vulnerability data.
☆14Updated 5 months ago
Alternatives and similar repositories for cvefree
Users that are interested in cvefree are comparing it to the libraries listed below
Sorting:
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Shodan Monitoring integration for TheHive.☆131Updated 9 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆53Updated this week
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- URL fingerprinting made easy☆89Updated last year
- Extensible framework for analyzing publicly available information about vulnerabilities☆117Updated 4 months ago
- Signature based honeypot detector tool written in Golang☆103Updated 5 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆56Updated 3 weeks ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆145Updated 4 months ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated 10 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆35Updated 9 months ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Updated 11 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- ☆53Updated 3 weeks ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Cyber Threat Intelligence Data, Indicators, and Analysis☆96Updated 2 months ago
- Data from Dark Web Marketplace scraping - Be careful☆41Updated 10 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆22Updated 2 years ago
- ☆44Updated 2 months ago
- A go-exploit to scan for implanted Cisco IOS XE Systems☆41Updated 10 months ago
- ☆96Updated 4 months ago
- Some of my rough notes for Docker threat detection☆47Updated 2 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆144Updated 2 years ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- ☆21Updated 2 years ago