toolswatch / vFeedLinks
The Correlated CVE Vulnerability And Threat Intelligence Database API
☆948Updated 4 years ago
Alternatives and similar repositories for vFeed
Users that are interested in vFeed are comparing it to the libraries listed below
Sorting:
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆548Updated 2 years ago
- Easy automated vulnerability scanning, reporting and analysis☆707Updated 5 years ago
- A low to medium interaction honeypot.☆469Updated last year
- Machinae Security Intelligence Collector☆530Updated last year
- Malicious HTTP traffic explorer☆720Updated 2 years ago
- Scan systems with NMap and parse the output to a list of CVE's, CWE's and DPE's☆281Updated 5 years ago
- ☆306Updated 8 years ago
- CRITs - Collaborative Research Into Threats☆907Updated 6 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Updated 6 years ago
- Version 2 of the ThreatCrowd API☆270Updated 2 years ago
- DPS' Lightweight Investigation Notebook☆432Updated last year
- Modular file scanning/analysis framework☆621Updated 5 years ago
- Incident Response Forensic Framework☆604Updated 5 years ago
- Malcom - Malware Communications Analyzer☆1,162Updated 7 years ago
- An information security preparedness tool to do adversarial simulation.☆1,133Updated 6 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,077Updated last week
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,294Updated 7 months ago
- ☆518Updated 4 years ago
- FAME Automates Malware Evaluation☆908Updated 3 weeks ago
- Web Application Honeypot☆584Updated last year
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆368Updated last year
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆469Updated 6 years ago
- Automater - IP URL and MD5 OSINT Analysis☆551Updated last year
- Pulled Pork for Snort and Suricata rule management (from Google code)☆438Updated 4 years ago
- Python low-interaction honeyclient☆1,020Updated 2 weeks ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Updated 7 years ago
- Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.☆740Updated last year
- Create actionable data from your Vulnerability Scans☆1,391Updated 2 years ago
- Pattern recognition for hosts, services, and content☆742Updated this week
- DejaVU - Open Source Deception Framework☆415Updated last month