Python client and module for Vulnerability-Lookup.
☆14Dec 9, 2025Updated 2 months ago
Alternatives and similar repositories for PyVulnerabilityLookup
Users that are interested in PyVulnerabilityLookup are comparing it to the libraries listed below
Sorting:
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- Sandbox samples and monitor them with kunai☆29Jun 24, 2025Updated 8 months ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆35Jan 8, 2026Updated last month
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 5 months ago
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 8 months ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Aug 14, 2025Updated 6 months ago
- ☆12Jun 6, 2025Updated 8 months ago
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- External telegram feeder for AIL framework☆18Jan 21, 2026Updated last month
- ☆14May 30, 2018Updated 7 years ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Dec 27, 2021Updated 4 years ago
- A preservation experiment to save photos from Flickr to your disk with the metadata embedded.☆17Mar 23, 2025Updated 11 months ago
- AIL project training materials☆39Jul 17, 2025Updated 7 months ago
- eBPF Sockmap Proxy☆16Mar 5, 2022Updated 3 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated this week
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- Turn an image into a sequence of sounds using a Hilbert Curve.☆14Feb 12, 2023Updated 3 years ago
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆19Feb 16, 2018Updated 8 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- Detection Rule License (DRL)☆21Dec 27, 2024Updated last year
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17May 13, 2024Updated last year
- CveXplore☆42Sep 12, 2025Updated 5 months ago
- ☆21Apr 19, 2024Updated last year
- ☆16Mar 10, 2017Updated 8 years ago
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆23Feb 11, 2026Updated 2 weeks ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 10 months ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- Rulezet is an open-source web platform for sharing, evaluating, improving, and managing cybersecurity detection rules (YARA, Sigma, Suric…☆42Updated this week
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago