opencve / opencve-docsLinks
OpenCVE documentation
☆49Updated 2 months ago
Alternatives and similar repositories for opencve-docs
Users that are interested in opencve-docs are comparing it to the libraries listed below
Sorting:
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆143Updated 2 years ago
- Tool to guess CPE name based on common software name☆105Updated last month
- Signature based honeypot detector tool written in Golang☆105Updated 7 months ago
- HASH (HTTP Agnostic Software Honeypot)☆140Updated last year
- Notus is a vulnerability scanner for creating results from local security checks☆60Updated 2 weeks ago
- Tail Certificate Transparency logs and extract hostnames☆124Updated 4 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated 2 weeks ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆117Updated 5 months ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 9 months ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆219Updated 3 years ago
- ☆24Updated 4 months ago
- POSIX script for mail security checks of domain names☆76Updated 2 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆52Updated last week
- ☆39Updated last week
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆48Updated 3 months ago
- Shodan Monitoring integration for TheHive.☆131Updated 10 months ago
- Pwnspoof repository☆264Updated 2 years ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆165Updated 3 weeks ago
- Identify IP addresses owned by public cloud providers☆126Updated last year
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆218Updated last year
- ☆114Updated 2 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆36Updated last month
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆163Updated 3 years ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆165Updated last year
- Do bulk whois lookups and get alerted on domains of interest.☆43Updated last year
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- Tool to discover external and internal network attack surface☆203Updated last year
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆58Updated 2 weeks ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆83Updated 2 months ago