toolswatch / vFeedLinks
The Correlated CVE Vulnerability And Threat Intelligence Database API
☆946Updated 4 years ago
Alternatives and similar repositories for vFeed
Users that are interested in vFeed are comparing it to the libraries listed below
Sorting:
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆548Updated 2 years ago
- A low to medium interaction honeypot.☆468Updated last year
- Machinae Security Intelligence Collector☆527Updated last year
- Easy automated vulnerability scanning, reporting and analysis☆702Updated 5 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆659Updated 6 years ago
- Malicious HTTP traffic explorer☆718Updated 2 years ago
- CRITs - Collaborative Research Into Threats☆904Updated 6 years ago
- Version 2 of the ThreatCrowd API☆272Updated 2 years ago
- Incident Response Forensic Framework☆603Updated 5 years ago
- ☆306Updated 8 years ago
- Scan systems with NMap and parse the output to a list of CVE's, CWE's and DPE's☆280Updated 5 years ago
- Web Application Honeypot☆580Updated last year
- Modular file scanning/analysis framework☆619Updated 5 years ago
- An information security preparedness tool to do adversarial simulation.☆1,128Updated 6 years ago
- DPS' Lightweight Investigation Notebook☆432Updated last year
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆368Updated last year
- Super Next generation Advanced Reactive honEypot☆467Updated last year
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- Pattern recognition for hosts, services, and content☆731Updated last week
- Python low-interaction honeyclient☆1,016Updated last month
- ☆512Updated 4 years ago
- Malcom - Malware Communications Analyzer☆1,162Updated 7 years ago
- A modular Python application to collect intelligence for malicious hosts.☆267Updated 4 years ago
- Create actionable data from your Vulnerability Scans☆1,389Updated 2 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆469Updated 6 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆829Updated 7 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,292Updated 6 months ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,070Updated 2 weeks ago
- Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.☆736Updated last year
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆629Updated last year