mikkolehtisalo / cvesync
CVE feed synchronization to issue management system
☆58Updated 10 years ago
Alternatives and similar repositories for cvesync:
Users that are interested in cvesync are comparing it to the libraries listed below
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆44Updated 10 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- module for osquery to load Bro logs into tables☆28Updated 10 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 6 years ago
- Hardening and Auditing Tool For Docker Hosts & Containers☆68Updated 9 years ago
- IRMA ansible☆24Updated 8 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- Network Defender Toolkit☆18Updated 11 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - Unit Tests for your Network -☆44Updated 6 years ago
- A Python library for being a CND Batman....☆35Updated 9 years ago
- A simple ssh private key password recovery tool written in Go☆22Updated last year
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- **BETA** A simple buildscript for network security monitoring on RHEL/CentOS☆31Updated 8 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Homographs: brutefind homographs within a font☆18Updated 8 years ago
- Stochastic Traffic Factoring Utility☆15Updated 8 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Flow-Indexer indexes flows found in chunked log files from bro,nfdump,syslog, or pcap files☆44Updated 11 months ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Identify web application versions☆18Updated 8 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 10 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago