r3volved / CVEAggregate
Build a CVE library with aggregated CISA, EPSS and CVSS data
☆27Updated last year
Alternatives and similar repositories for CVEAggregate:
Users that are interested in CVEAggregate are comparing it to the libraries listed below
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆45Updated 6 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆30Updated 4 months ago
- Semgrep-based Policy Controller for Kubernetes☆46Updated this week
- Nuclei plugins to audit Chrome extensions☆64Updated 6 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 2 months ago
- Tool for obfuscating and deobfuscating data.☆67Updated 10 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- Hijack a slack bot to phish your way in☆48Updated last month
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated 4 months ago
- ☆109Updated last year
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆17Updated 6 months ago
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆33Updated 6 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆99Updated 3 months ago
- ☆42Updated 8 months ago
- InfoSec OpenAI Examples☆19Updated last year
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆71Updated last year
- Examine Chrome extensions for security issues☆74Updated this week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆34Updated this week
- ☆55Updated last year
- ☆16Updated 3 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆47Updated 2 months ago
- Security tool against dependency typosquatting attacks☆39Updated this week
- ☆31Updated 3 months ago
- Additional active scan checks for BURP☆26Updated 4 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆72Updated 11 months ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- Modular web-application honeypot platform built using go and gin☆55Updated 9 months ago
- a hackbot proof-of-concept☆37Updated 11 months ago