Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

adulau@infosec.exchangeA

adulau@infosec.exchange

@adulau@infosec.exchange
About
Posts
12
Topics
6
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • I maintain two pages of resources through my company, Paralus, one on CTI the other on ICS/OT: https://paralus.co/resources/
    adulau@infosec.exchangeA adulau@infosec.exchange

    @mttaggart

    Do you know if there is a way to sync between Wallabag instances? I’m sure we are all archiving very similar pages.

    @jfslowik @internetarchive

    Uncategorized

  • I maintain two pages of resources through my company, Paralus, one on CTI the other on ICS/OT: https://paralus.co/resources/
    adulau@infosec.exchangeA adulau@infosec.exchange

    @jfslowik This is driving me nuts. I often end up by adding @internetarchive links too. All our materials are sand castle.

    Uncategorized

  • I still don’t understand why some bots try to enumerate everything via the Vulnerability-Lookup API when full dumps, including all metadata, are available in one shot:
    adulau@infosec.exchangeA adulau@infosec.exchange

    I still don’t understand why some bots try to enumerate everything via the Vulnerability-Lookup API when full dumps, including all metadata, are available in one shot:

    Vulnerability-Lookup JSON dumps

    favicon

    (vulnerability.circl.lu)

    We currently don’t rate-limit bots, but we’re close to doing so.

    #bot #internet

    Uncategorized bot internet

  • Does anyone know how to report errors to https://db.gcve.eu/?
    adulau@infosec.exchangeA adulau@infosec.exchange

    @airtower

    It’s indeed a problem and we are working on a cpe editor at GCVE to propose links to vulnerabilities towards vendor, product, version. And people can query that for correcting potential wrong attribution to vendor, product.

    Link Preview Image
    GitHub - gcve-eu/cpe-editor: A collaborative CPE editor

    A collaborative CPE editor. Contribute to gcve-eu/cpe-editor development by creating an account on GitHub.

    favicon

    GitHub (github.com)

    We plan to release it online in the next weeks.

    @Bubu @gcve

    Uncategorized buildroot cve gcve

  • Plum, for Proactive Land Uncovering & Monitoring, is an orchestration tool to learn, monitor, and document an exposure surface.
    adulau@infosec.exchangeA adulau@infosec.exchange

    Plum, for Proactive Land Uncovering & Monitoring, is an orchestration tool to learn, monitor, and document an exposure surface. It coordinates work between scanning agents, keeps historical results, and makes observations searchable over time.

    This project, part of D4 which was initially co-funded by the European Union, is still young, but it already addresses a concrete need: helping CIRCL to keep a global view of Luxembourg’s IP space, especially in the context of NIS2-related activities. The goal is not only to scan, but to maintain actionable knowledge of the national perimeter, its visible exposures and allows vulnerability discovery in the context of incident response.

    #plum #scanning #networkscanning #cybersecurity #recon #csirt

    Link Preview Image
    Plum: knowing and monitoring your perimeter | D4 Project

    favicon

    (www.d4-project.org)

    Uncategorized plum scanning networkscanning cybersecurity recon

  • Does anyone know how to report errors to https://db.gcve.eu/?
    adulau@infosec.exchangeA adulau@infosec.exchange

    @airtower

    https://vulnerability.circl.lu/dumps/ contains the full dump of all the sources. I feel your pain but we are trying to provide at minima the correlation among the different sources. We don’t actually modify the source but if you see a way to actually get proposal in an automatic way and extend it via GCVE records. I’m interested.

    @Bubu @gcve

    Uncategorized buildroot cve gcve

  • Drone and UAV Forensic
    adulau@infosec.exchangeA adulau@infosec.exchange

    Drone and UAV Forensic

    This repository is designed to accelerate the forensic analysis of DIY FPV drones and to help automate technical reporting from seized or recovered artifacts.

    The goal is pragmatic: extract useful evidence faster, normalize outputs, and produce data that can be reused in reports or shared into investigative platforms such as MISP.

    🔗 https://github.com/CIRCL/Drone-Forensic

    #drone #uav #opensource #dfir #threatintelligence #threatintel #misp #digitalforensics

    @circl
    @misp

    Uncategorized drone uav opensource dfir threatintellige

  • Does anyone know how to report errors to https://db.gcve.eu/?
    adulau@infosec.exchangeA adulau@infosec.exchange

    @airtower

    I think there is a confusion between the messenger (GCVE database which is correlating more than 70 sources) and the source of the CVE records.

    The two CVEs mentioned are coming from the official cvelistv5 source. We (GCVE) don't change the records from the different sources. The origin is the actual CVE program database.

    The contact email is in the GCVE about page -> https://db.gcve.eu/about

    You can also put comments on the records on the https://vulnerability.circl.lu/ which is also synced to the DB GCVE.

    We feel your pain with incorrect data from the sources. Ideas are more than welcome.

    @gcve

    Uncategorized buildroot cve gcve

  • We are cleaning various code base including MISP.
    adulau@infosec.exchangeA adulau@infosec.exchange

    We are cleaning various code base including MISP. I'm wondering if someone still uses OpenIOC format in someways?

    #openioc #threatintel #opensource

    Uncategorized openioc threatintel opensource

  • Some updates on the MISP Galaxy website:
    adulau@infosec.exchangeA adulau@infosec.exchange

    Some updates on the MISP Galaxy website:

    MITRE Fight Fraud Framework - MISP galaxy

    MITRE Fight Fraud Framework (F3) matrix of fraud techniques.

    favicon

    (www.misp-galaxy.org)

    It now includes a matrix-like view of the galaxy for @misp

    #misp #cti #threatintel #threatintelligence

    Uncategorized misp cti threatintel threatintellige

  • I hate Discord.
    adulau@infosec.exchangeA adulau@infosec.exchange

    @eragon At least you can pull-requests on the discourse repository to fix your issues 😉

    Chat Protocols and Apps opensource discourse

  • I hate Discord.
    adulau@infosec.exchangeA adulau@infosec.exchange

    I hate Discord. The platform is proprietary, the U/X is just completely confusing and it's difficult to find anything.

    If you run a project, I love @Discourse - it's open source, the U/X is great and you can archive everything in markdown (and much more).

    https://github.com/discourse/discourse
    and we run it for GCVE https://discourse.ossbase.org/c/gcve/14

    #opensource #discourse

    Chat Protocols and Apps opensource discourse
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups