viniciuspereiras / cveutils
This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST National Vulnerability Database (NVD) RESTful API.
☆14Updated last year
Alternatives and similar repositories for cveutils:
Users that are interested in cveutils are comparing it to the libraries listed below
- ☆17Updated last year
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆20Updated last year
- ☆22Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 6 months ago
- Tricard - Malware Sandbox Fingerprinting☆19Updated last year
- Random scripts for azure stuff☆11Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆17Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆34Updated last year
- ☆14Updated last month
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 9 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- A simple to use single-include Windows API resolver☆19Updated 6 months ago
- ☆27Updated last year
- Continuous kerberoast monitor☆44Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- shellcode obfuscater and runner in golang☆11Updated last year
- Deployment code for ashirt-server☆19Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆32Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- SecurityBsides Roma Conference Repo☆10Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago