shadawck / mitrecveLinks
Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)
☆16Updated 2 years ago
Alternatives and similar repositories for mitrecve
Users that are interested in mitrecve are comparing it to the libraries listed below
Sorting:
- Unicode encoding attacks with machine learning☆97Updated 3 years ago
- Python 3 library to request https://crt.sh/☆33Updated 2 months ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- Port Crawler Pythonized☆19Updated 2 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆36Updated 6 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated last year
- ☆44Updated 3 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆68Updated 3 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 3 years ago
- Perform CVE lookup on cvedetails.com☆24Updated last year
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- A rogue DNS detector☆23Updated last year
- Typodetect☆74Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 5 months ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- Slides and materials for conference presentations☆11Updated 2 years ago
- A list of queries and actions that I repeat over and over again☆64Updated 4 years ago
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆16Updated last year
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago
- Resources, Tips, Tricks , Resources, Notes and much more☆21Updated 2 years ago
- ☆33Updated 5 months ago
- Volatility MindMap & Cheat Sheet☆29Updated 3 years ago
- ☆54Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆58Updated 3 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated 10 months ago
- Various scripts and codes☆84Updated 4 years ago
- Nmap Web Dashboard and Reporting☆34Updated 3 years ago