kaze-technologies / cvefreeLinks
Kaze's openly available CVE vulnerability data.
☆14Updated 3 months ago
Alternatives and similar repositories for cvefree
Users that are interested in cvefree are comparing it to the libraries listed below
Sorting:
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 11 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Signature based honeypot detector tool written in Golang☆98Updated 3 months ago
- A go-exploit to scan for implanted Cisco IOS XE Systems☆42Updated 8 months ago
- Data from Dark Web Marketplace scraping - Be careful☆40Updated 8 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆54Updated 4 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆55Updated 3 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 7 months ago
- Nmap script to detect a Microsoft Exchange instance version with OWA enabled.☆82Updated 2 weeks ago
- Citrix Scanner for CVE-2023-3519☆51Updated last year
- Shodan Monitoring integration for TheHive.☆131Updated 7 months ago
- ☆51Updated 3 weeks ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆54Updated last month
- Extensible framework for analyzing publicly available information about vulnerabilities☆117Updated 2 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 10 months ago
- ☆43Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Sniffing out well-known threat groups☆50Updated 11 months ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆52Updated last week
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆35Updated last month
- Tool to discover external and internal network attack surface☆199Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆15Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 8 months ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 3 weeks ago
- ☆33Updated this week
- Linux Evidence Acquisition Framework☆119Updated 9 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆47Updated 4 months ago