opencve / opencve-docsLinks
OpenCVE documentation
☆49Updated this week
Alternatives and similar repositories for opencve-docs
Users that are interested in opencve-docs are comparing it to the libraries listed below
Sorting:
- Tail Certificate Transparency logs and extract hostnames☆127Updated 7 months ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆51Updated last week
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆262Updated 3 years ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated last year
- POSIX script for mail security checks of domain names☆76Updated 2 years ago
- Signature based honeypot detector tool written in Golang☆108Updated 10 months ago
- Nmap script to detect a Microsoft Exchange instance version with OWA enabled.☆83Updated this week
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- A repository for possible zgrab2 configurations☆27Updated 3 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 3 years ago
- firedrill is a malware simulation harness for evaluating your security controls☆197Updated 2 years ago
- A semi-curated list of Security Feeds☆144Updated 3 years ago
- Tools for finding SMTP smuggling vulnerabilities.☆143Updated last year
- Pwnspoof repository☆264Updated 2 years ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆167Updated last year
- A go-exploit to scan for implanted Cisco IOS XE Systems☆41Updated last year
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆59Updated 3 years ago
- Generate list of potential typo squatting domains with domain name permutation engine to feed AIL and other systems.☆103Updated 9 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- ☆41Updated this week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆56Updated 3 months ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆63Updated 3 months ago
- A fast and comprehensive tool for organizational network scanning☆134Updated last year
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.☆453Updated last year
- ☆14Updated 2 years ago
- NTP Exfiltration Tool☆148Updated 2 years ago
- Tools and blogs I use to perform GCP red teams☆136Updated last year
- Notus is a vulnerability scanner for creating results from local security checks☆61Updated this week
- Upload files done during my research.☆169Updated 2 months ago