kaze-technologies / cvefree
Kaze's openly available CVE vulnerability data.
☆13Updated last month
Alternatives and similar repositories for cvefree
Users that are interested in cvefree are comparing it to the libraries listed below
Sorting:
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆51Updated 2 months ago
- Sniffing out well-known threat groups☆28Updated 9 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆29Updated 6 months ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆18Updated 7 months ago
- Manage attack surface data on Elasticsearch☆22Updated last year
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 8 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 9 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated 2 weeks ago
- ☆12Updated 3 years ago
- Virtual Security Operations Center☆50Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 6 months ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆53Updated 2 months ago
- ☆20Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 5 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆26Updated 5 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆39Updated 3 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆44Updated last year
- ☆13Updated 2 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆27Updated last month
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆24Updated last year