Command-line tool that helps cybersecurity researchers discover, analyze, and document vulnerabilities from the National Vulnerability Database (NVD) for security research and PoC development.
☆15Mar 31, 2025Updated last year
Alternatives and similar repositories for cve-dash
Users that are interested in cve-dash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Friedel's Initialization and Service Supervision☆21Dec 26, 2023Updated 2 years ago
- Network scanning tool designed to detect and report changes in open ports and services over time☆13Oct 16, 2025Updated 6 months ago
- Browser extension for launching multi-platform OSINT queries from grouped YAML profiles.☆10Apr 25, 2025Updated 11 months ago
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Mar 13, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automatically updated lists of Tor Relays.☆18Updated this week
- Indicators of compromise☆17Jan 29, 2026Updated 2 months ago
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated 2 months ago
- OSINT Graph Investigation Application☆32Dec 11, 2025Updated 4 months ago
- 📜 Scrape targeted wordlists for password cracking using CSS selectors☆45Apr 7, 2026Updated last week
- A Ligolo-ng JavaScript agent working inside Chrome & Chromium-based browsers by leveraging Isolated Web Applications.☆121Mar 30, 2026Updated 2 weeks ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆38Jan 2, 2025Updated last year
- Various DNS dumps (daily new domains, FQDNs, etc.)☆28Updated this week
- MSIX Building Made Easy for Defenders☆64Aug 25, 2025Updated 7 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆58Apr 10, 2026Updated last week
- ☆42Sep 5, 2025Updated 7 months ago
- Microsoft Vulnerable Driver Block Lists in CSV and JSON for SIEM lookups☆55Sep 19, 2025Updated 6 months ago
- Portable pipestatus for UNIX/POSIX shells☆24Jan 8, 2021Updated 5 years ago
- Turn any blog into structured threat intelligence.☆55Updated this week
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆40Jun 16, 2024Updated last year
- Simple gksu replacement using spacefm dialog, zenity or yad☆10Feb 23, 2022Updated 4 years ago
- A readline replacement. This is an evolution of the tinyrl library from clish.☆11Jan 29, 2016Updated 10 years ago
- Automated cloud infrastructure diagram and technical documentation☆32Jan 16, 2025Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Run your tty programs pseudo-headlessly under a process supervisor☆14Apr 29, 2018Updated 7 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- Go tool to declaratively bump dependencies.☆12Updated this week
- A deceptively simple way to add a configuration file to a command-line application.☆17Mar 11, 2025Updated last year
- A pinentry implementation that utilizes rofi dmenu☆10Feb 4, 2023Updated 3 years ago
- An alias manager that allows you to easily add, delete or list your bash aliases in your ".bashrc" file by automating and securing every …☆14Apr 19, 2024Updated last year
- man page to markdown converter☆15Jan 27, 2021Updated 5 years ago
- ☆10Aug 26, 2025Updated 7 months ago
- fluid mouse keys for X11☆17Dec 14, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 🖼 imgify - Convert any file to PNG and back.☆13Oct 20, 2025Updated 5 months ago
- Newly Registered Domains (NRD) lists generated from WhoisDS.com free database — daily domain lists for security and threat analysis.☆41Updated this week
- A quick and easy PowerShell script to collect a packet trace with option to convert .etl to .pcap.☆40Oct 26, 2022Updated 3 years ago
- A simple infrastructure and configuration management tool☆14Aug 7, 2022Updated 3 years ago
- ☆78Feb 19, 2026Updated last month
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆33Aug 7, 2024Updated last year
- Minimal PID 1 for initramfs☆19Jan 16, 2025Updated last year