finds you similar websites
auto-suggest    top sites

May 9th, 2024

10 Popular Sites Like Mitre Cve

The team has explored the net and located a lot of striking security and vulnerability sites like Mitre Cve. So come and check out additional websites that are complementary to Mitre Cve.

Displaying 491 to 500 of 500 alternatives to Mitre Cve. (Updated: May 9th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like Mitre Cve:
  CVE - Common Vulnerabilities and Exposures (C...
Aims to standardize the names for all publicly known vulnerabilities and security exposures.
http://cve.mitre.org/
popularity:
security
vulnerability
reference
vulnerabilities
exploits
hacking
networking
computer
cve
database
new search by a custom tag signature
  samy kamkar
Welcome to samy.pl. I am samy. Here is my unsanitary, public code. New/Updated programs: ... console-inject.pl - same as above but ... Email me at samy@samy.pl ...
similarity:
popularity:
security
perl
hacking
network
code
programming
tools
samy
hacker
hacks
  Ophcrack - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
security
hacking
software
password
crack
windows
computing
wikipedia
linux
ophcrack
  Sentrigo | Database Security, Database Activity Monitoring, SQL Injection Tools
No information avaiable
similarity:
popularity:
database
security
oracle
monitoring
software
linux
db
ssi
tool
sql
  卡饭安软交流中心
No information avaiable
similarity:
popularity:
security
software
安全
kaspersky
杀毒
论坛
computer
  Astaro - Astaro
Schutz Ihrer Netzwerkinfrastruktur gegen Bedrohungen aus dem Internet wie Hacking, Spyware, Viren, Phishing, Spam und andere Malware aus dem Web.
similarity:
popularity:
security
firewall
linux
network
internet
proxy
computer
business
software
technology
  Peter Van Eeckhoutte's IT Research Blog
... WWL0JCZzrdrDtmPBd1L5tTXi7vtrjkkjuCjpwni7Q0CAOx8HdqX4TNb6gvUw8BYW7rdzNChH ... LwoQM 3G13z69vpW/5K3OqxvNS+DczGWb3GoqDP5NJtLI8YwZIOCKoqc9Y8aoj0TvNNlMTBtu4NKqV ...
similarity:
popularity:
security
blog
exploit
tools
networking
infosec
windows
juniper
exchange
tutorial
  Ask Tom: On Injecting and Comparing
No information avaiable
similarity:
popularity:
oracle
sql
security
database
asktom
sqlinjection
compare
hacking
sql_injection
sql-injection
  CERT-In:Indian Computer Emergency Response Team
The Indian Computer Emergency Response Team (CERT-In) has been established by the Department of Information Technology to be a part of the international CERT ...
similarity:
popularity:
india
security
cert
internet
computer
computers
cert-in
team
response
software
  Installation Completed | Trusteer
No information avaiable
similarity:
popularity:
security
banking
rapport
protection
trusteer
hsbc
software
computing
reference
fraud
  Designing and Using DMZ Networks to Protect Internet Servers
No information avaiable
similarity:
popularity:
dmz
security
firewall
network
networking
architecture
< prev 1 ... 48 49 50
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.