Skip to content

Latest commit

 

History

History
52 lines (25 loc) · 2.48 KB

strobes-intel.md

File metadata and controls

52 lines (25 loc) · 2.48 KB

Strobes Intel

Strobes Intel is a GPT-based app that provides information about the latest CVEs (Common Vulnerabilities and Exposures), exploits, and more. It can help you stay up to date with the latest security vulnerabilities in the world of technology. Whether you need to know about a specific CVE or want to patch a vulnerability, Strobes Intel has got you covered. Just ask about a specific CVE or how to patch a particular vulnerability, and Strobes Intel will provide you with the information you need. Stay secure with Strobes Intel!

Example prompts

  1. Prompt 1: "What is the latest information on CVE-2023-4863?"

  2. Prompt 2: "Can you provide details about CVE-2023-4966?"

  3. Prompt 3: "How can I patch CVE-2023-4966?"

Command names and descriptions

  1. subscribe: Subscribe to receive updates and notifications.

  2. get_cve_by_id: Get information about a specific CVE by its ID.

  3. get_user_review: Get user reviews for a specific CVE.

  4. get_stats: Get statistics and data about the current vulnerabilities.

  5. search_keyword: Search for vulnerabilities using a specific keyword.

  6. get_status: Get the current status of the Intel service.

  7. get_ip_location: Get the location information for a specific IP address.

  8. add_user_review: Add a user review for a specific CVE.

  9. get_automated_patch: Get an automated patch for a specific vulnerability.

  10. filter_cves: Filter CVEs based on specific criteria.

  11. get_product_details: Get details about a specific vulnerable product.

  12. download_data: Download data for a specific date.

  13. get_subdomains: Get subdomains for a specific domain.

  14. run_attack_surface_tools: Run attack surface tools for a specific vulnerability.

  15. get_threat_actors: Get information about threat actors.

  16. get_msrc_kb_supercedence: Get information about Microsoft Security Response Center (MSRC) KB supercedence.

  17. get_latest_zerodays: Get the latest zero-day vulnerabilities.