ra1nb0rn / cpe_searchView external linksLinks
Search for Common Platform Enumeration (CPE) strings using software names and titles.
☆24Updated this week
Alternatives and similar repositories for cpe_search
Users that are interested in cpe_search are comparing it to the libraries listed below
Sorting:
- Windows EDR agent in Rust. ETW telemetry → Sigma/YARA detection → ECS alerts. User-mode, open-source, high-performance.☆57Feb 4, 2026Updated last week
- Tool to guess CPE name based on common software name☆117Updated this week
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated 2 weeks ago
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Library for extracting fields from Sigtran TCAP/INAP messages☆11Feb 5, 2026Updated last week
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- Module signature file manipulation☆17Oct 7, 2025Updated 4 months ago
- ☆10Aug 18, 2017Updated 8 years ago
- Scanning alive hosts of the given CIDR range in parallel.☆10May 8, 2025Updated 9 months ago
- ☆13Jun 29, 2025Updated 7 months ago
- A simplistic but fast Web Content Scanner written in nodejs.☆11Jun 5, 2025Updated 8 months ago
- Official OWASP Top 10 Document Repository☆10Jan 9, 2018Updated 8 years ago
- ☆19Dec 4, 2025Updated 2 months ago
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- ☆12Sep 11, 2014Updated 11 years ago
- AIS3 2020 pre-exam writeup☆10Jun 30, 2020Updated 5 years ago
- RDF discovery and publication platform☆10Jan 30, 2026Updated 2 weeks ago
- Yara sort☆13Updated this week
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- A powerful prompt template engine built upon Jinja☆12Oct 22, 2025Updated 3 months ago
- Publicly accessible version of the FiGHT website.☆16Nov 14, 2025Updated 3 months ago
- The official repository of PowersheLLM, a model for Powershell maliciousness detection using fine-tuned LLM☆12Jun 6, 2024Updated last year
- Hunter Javascript obfuscator written in Go☆13May 20, 2022Updated 3 years ago
- Power-Forensics is the Best Friend for Incident Responders to perform IR and collect evidences for Linux based host☆12Jun 2, 2023Updated 2 years ago
- Example for the Google Chrome cache attack to inject custom code into web pages (macOS, Linux, browser version: 124.0.6367.62 and older)☆12May 10, 2024Updated last year
- IMRPOVED simple vector database made in numpy☆14Jun 2, 2024Updated last year
- A simple blogging platform running in a Docker container.☆15Feb 6, 2026Updated last week
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastruc…☆10Jun 10, 2024Updated last year
- Simple web app to track OWASP WSTG security testing progress☆27Sep 12, 2025Updated 5 months ago
- Summarize CTI reports with OpenAI☆18Feb 9, 2026Updated last week
- Go bindings for YARA☆14Aug 24, 2025Updated 5 months ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆14Aug 15, 2022Updated 3 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15May 12, 2023Updated 2 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Scripts to help and speed up reversing activities☆13Jan 12, 2026Updated last month
- ☆15Dec 4, 2023Updated 2 years ago
- Safe Rust API to libesedb☆12Sep 10, 2025Updated 5 months ago