shadawck / mitrecveView external linksLinks
Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)
β17Aug 20, 2022Updated 3 years ago
Alternatives and similar repositories for mitrecve
Users that are interested in mitrecve are comparing it to the libraries listed below
Sorting:
- π§° Various PowerShell scripts for security, sysadmins, blue and red teamsπ«πΌβ52Aug 28, 2025Updated 5 months ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many moreβ13Dec 20, 2022Updated 3 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis processβ19Oct 26, 2013Updated 12 years ago
- Find your router's default passwordβ14Apr 7, 2015Updated 10 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!β13Apr 19, 2020Updated 5 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEβ¦β11May 19, 2020Updated 5 years ago
- β49Dec 11, 2025Updated 2 months ago
- Collection of tool you need to have in your Endpoint Detection and Response arsenalβ114Mar 22, 2024Updated last year
- ALL IN ONE Hacking Tool For Hackersβ10Dec 12, 2020Updated 5 years ago
- β12Jan 12, 2023Updated 3 years ago
- to show all hidden EFIs and any APFS subvolumesβ11Jul 5, 2021Updated 4 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and cβ¦β17Dec 29, 2013Updated 12 years ago
- β13Aug 18, 2022Updated 3 years ago
- Slack integration for MagicMirrorΒ²β10Sep 9, 2020Updated 5 years ago
- Binary and Static Releasesβ16Nov 18, 2025Updated 2 months ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detectβ12Aug 1, 2020Updated 5 years ago
- CyberSecurity Resources (Threat Intelligence, Malware Analysis, Pentesting, DFIR, etc)β10Nov 30, 2023Updated 2 years ago
- A Python based Recon Tool to search for Storage Bucketsβ11Jan 21, 2023Updated 3 years ago
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.β10Aug 13, 2022Updated 3 years ago
- Simple calculator app with theme switcherβ11Jul 30, 2021Updated 4 years ago
- Spider or repeater to find all links.β10Feb 7, 2021Updated 5 years ago
- Generic Signature Format for SIEM Systemsβ14Oct 27, 2021Updated 4 years ago
- A tool to find/download malware samples from various public repositoriesβ12Dec 22, 2021Updated 4 years ago
- Diving into Popularity of GitHub Repositoriesβ13Sep 15, 2023Updated 2 years ago
- π¦π¬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.β11Jan 9, 2020Updated 6 years ago
- MMM-OpenWeather24Hours is a 3rd party module for MagicMirror that shows weather information for the next 24 hours. The weather data is taβ¦β11Apr 21, 2024Updated last year
- Stealth is a File Integrity scanner performing its work in a stealthy way.β12Jun 25, 2018Updated 7 years ago
- β11Nov 9, 2022Updated 3 years ago
- A curated collection of scripts for kernel-related devopsβ13Nov 23, 2023Updated 2 years ago
- π systemd scripts for the juice4halt Raspberry Pi UPS HATβ14Mar 28, 2024Updated last year
- Public Github Pages for Ciscoβ14Oct 16, 2018Updated 7 years ago
- An interactive world-map that has been used in live Cyber Threat interfacesβ13Jul 31, 2021Updated 4 years ago
- Writeup of CVE-2020-15906β49Oct 26, 2020Updated 5 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.β13Apr 17, 2016Updated 9 years ago
- Script to give overview of an Operating Systemβ12Jun 1, 2025Updated 8 months ago
- Scripts to help automate tedious red teaming enumeration and tasks.β17Mar 23, 2020Updated 5 years ago
- A small Python script to get the heart rate data generated from an Apple Watch in a CSV formβ19Jan 4, 2018Updated 8 years ago
- Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.β11Feb 3, 2024Updated 2 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)β15Dec 26, 2019Updated 6 years ago