kaze-technologies / cvefreeLinks
Kaze's openly available CVE vulnerability data.
☆15Updated 9 months ago
Alternatives and similar repositories for cvefree
Users that are interested in cvefree are comparing it to the libraries listed below
Sorting:
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆46Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 3 years ago
- A go-exploit to scan for implanted Cisco IOS XE Systems☆41Updated last year
- URL fingerprinting made easy☆90Updated last year
- ☆52Updated 5 months ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆107Updated last week
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated 4 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆44Updated last year
- Shodan Monitoring integration for TheHive.☆130Updated last year
- Data from Dark Web Marketplace scraping - Be careful☆43Updated last year
- Virtual Security Operations Center☆52Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- ☆34Updated 2 months ago
- Sniffing out well-known threat groups☆64Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆60Updated 2 months ago
- ☆12Updated last year
- Citrix Scanner for CVE-2023-3519☆53Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆157Updated 8 months ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆127Updated last month
- Some of my rough notes for Docker threat detection☆49Updated 2 years ago
- ☆10Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆78Updated this week
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago