stanfrbd / searchcveLinks
Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.
☆41Updated 11 months ago
Alternatives and similar repositories for searchcve
Users that are interested in searchcve are comparing it to the libraries listed below
Sorting:
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Updated 4 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆52Updated 3 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Updated 8 months ago
- Learning volatility plugins.☆18Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 4 years ago
- ☆42Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 4 years ago
- Automatically exported from code.google.com/p/nipper-ng☆73Updated 3 years ago
- Website for ail-typo-squatting library☆71Updated 4 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Updated 10 months ago
- ☆44Updated 7 months ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated 2 months ago
- ☆69Updated 4 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Updated 6 years ago
- nse script to inject jndi payloads☆46Updated 4 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 4 years ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 5 years ago
- A collection of tips for using MISP.☆75Updated last year
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆166Updated last week
- Web Application for domain name monitoring / alerting☆64Updated last year
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- ☆29Updated last year
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- Tools used by CSIRT and especially in the scope of CNW☆17Updated 3 weeks ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- ☆80Updated 2 years ago
- Carbon Black Response IR tool☆55Updated 5 years ago
- ☆20Updated 2 weeks ago