stanfrbd / searchcve
Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.
☆39Updated 2 months ago
Alternatives and similar repositories for searchcve:
Users that are interested in searchcve are comparing it to the libraries listed below
- Retrieves information about a given domain from the Google Transparency Report : https://transparencyreport.google.com/https/certificates☆21Updated 3 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 4 years ago
- CSIRT Jump Bag☆26Updated last year
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 7 months ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆35Updated 3 months ago
- Sigma rules converted for direct use with Zircolite☆13Updated this week
- ☆17Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆24Updated 5 years ago
- ☆69Updated 3 years ago
- AIL project training materials☆29Updated 2 months ago
- Repository resource threat intelligence for SOC☆10Updated 6 years ago
- Simulates a compromise in a cloud and container environment☆32Updated 4 months ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- ☆41Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- ☆19Updated 4 years ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
- ☆28Updated 3 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆27Updated this week
- ☆42Updated 2 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated last year
- Hunt malware with Volatility☆47Updated 11 months ago
- Import AbuseCH IOC Feeds into MISP☆12Updated 4 years ago
- A collection of tips for using MISP.☆74Updated 4 months ago