shadawck / mitrecve
Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)
☆16Updated 2 years ago
Alternatives and similar repositories for mitrecve:
Users that are interested in mitrecve are comparing it to the libraries listed below
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 9 months ago
- Oracle Database Penetration Testing Reference (10g/11g)☆36Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 2 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 4 months ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- WStalker: an easy proxy☆25Updated 4 years ago
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- ☆42Updated 2 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 2 years ago
- shellcode obfuscater and runner in golang☆11Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆28Updated 3 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- Continuous kerberoast monitor☆44Updated last year
- ☆41Updated 11 months ago
- ☆33Updated 2 months ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 3 years ago
- Ingest openldap data into bloodhound☆78Updated 4 years ago
- ☆19Updated 3 years ago
- A tool to password spray Jenkins instances☆55Updated 5 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago