trinitor / CVE-Vulnerability-Information-DownloaderView external linksLinks
Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to show how such a dashboard can be created.
☆142Jan 24, 2023Updated 3 years ago
Alternatives and similar repositories for CVE-Vulnerability-Information-Downloader
Users that are interested in CVE-Vulnerability-Information-Downloader are comparing it to the libraries listed below
Sorting:
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- Find Email Spoofing Vulnerablity of domains☆96Jul 30, 2024Updated last year
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Sep 11, 2024Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- ☆30Jul 28, 2024Updated last year
- ☆13Mar 1, 2024Updated last year
- ☆110Feb 21, 2023Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 2 years ago
- ☆57Updated this week
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 10 months ago
- Status Checker is a Python tool for swiftly checking the status of URLs. It categorizes responses by HTTP status codes, offering clear in…☆49May 18, 2025Updated 8 months ago
- A GraphQL enumeration and extraction tool☆134Jan 29, 2023Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆13Jul 17, 2025Updated 6 months ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Dec 26, 2023Updated 2 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆72Jun 3, 2025Updated 8 months ago
- An AI-powered Personal Identifiable Information (PII) scanner.☆719Jan 22, 2025Updated last year
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆41Oct 18, 2023Updated 2 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Feb 20, 2024Updated last year
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- ☆90Feb 11, 2022Updated 4 years ago
- Passive-Recursive DNS daemon☆26Sep 20, 2024Updated last year
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆591Nov 9, 2024Updated last year
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆175Nov 7, 2022Updated 3 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Mar 4, 2023Updated 2 years ago
- ☆160Nov 26, 2023Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Dec 13, 2025Updated 2 months ago
- ☆104Oct 24, 2022Updated 3 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated last year
- A Web Vulnerability Scanner and Patcher☆169Jan 13, 2026Updated last month
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆142Nov 3, 2025Updated 3 months ago
- Modular framework to exploit UPS devices☆64Mar 1, 2023Updated 2 years ago
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆181Dec 22, 2025Updated last month
- ☆18Mar 26, 2024Updated last year
- Kubernetes exploitation tool☆364Jul 26, 2024Updated last year
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆219Jul 14, 2024Updated last year
- A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration☆337Dec 12, 2025Updated 2 months ago