1Synthetic Exercise World – Fictional dataset for cyber exercises and standards (opens in new tab)(github.com)2adulau18h ago0
2MISP-Ghidra is a Python library and scripts to extend Ghidra (opens in new tab)(github.com)1adulau2mo ago0
3Security Advisory Ivanti Endpoint Manager Mobile (EPMM) – Active Exploitation (opens in new tab)(circl.lu)1adulau2mo ago0
4GCVE – Launch of Db.gcve.eu – A New Open Public Vulnerability Advisory Database (opens in new tab)(gcve.eu)2adulau3mo ago0
5The Art of Pivoting – Techniques for Intelligence Analysts (opens in new tab)(github.com)2adulau4mo ago0
7Kvrocks: Redis-compatible distributed key value NoSQL database (opens in new tab)(kvrocks.apache.org)77adulau1y ago16
8Vulnerability-Lookup facilitates quick correlation of vulnerabilities (opens in new tab)(vulnerability-lookup.org)4adulau1y ago0
9Flowintel – open-source platform designed to assist security analysts (opens in new tab)(github.com)1adulau1y ago0
10Developing and Utilizing Open Source Solutions Enhances Csirt Capabilities (opens in new tab)(foo.be)2adulau1y ago0
11Onion-lookup is a service for checking the existence of Tor hidden services (opens in new tab)(onion.ail-project.org)4adulau1y ago1
13Ssldump – (de-facto repository gathering patches around the cyberspace) (opens in new tab)(github.com)2adulau1y ago0
15Automating Software Identification from Network Vulnerability Scanners (opens in new tab)(d4-project.org)2adulau1y ago0