stanfrbd / searchcveLinks
Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.
☆40Updated 3 months ago
Alternatives and similar repositories for searchcve
Users that are interested in searchcve are comparing it to the libraries listed below
Sorting:
- ☆42Updated last year
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆21Updated 5 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 4 years ago
- isodump - ISO dump utility☆40Updated 5 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 4 months ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated last month
- Thor Artifacts for Velociraptor☆16Updated 11 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆35Updated this week
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 8 months ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- Hunt malware with Volatility☆47Updated last year
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
- Retrieves information about a given domain from the Google Transparency Report : https://transparencyreport.google.com/https/certificates☆21Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- The core backend server handling API requests and task management☆39Updated last week
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated 3 weeks ago
- Import AbuseCH IOC Feeds into MISP☆12Updated 4 years ago
- Site for IWS book content☆18Updated 6 years ago
- ☆20Updated 4 years ago