AppThreat / vulnerability-dbLinks
Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers.
☆129Updated last month
Alternatives and similar repositories for vulnerability-db
Users that are interested in vulnerability-db are comparing it to the libraries listed below
Sorting:
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆137Updated last year
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆225Updated this week
- A comprehensive list of software composition analysis tools.☆155Updated last year
- Vulnogram is a tool for creating and editing CVE information in CVE JSON format☆199Updated 4 months ago
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆177Updated this week
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆127Updated 6 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆95Updated 7 months ago
- Tool to guess CPE name based on common software name☆104Updated last week
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆331Updated this week
- Global Security Database☆317Updated last year
- A project to visualize the software supply chain☆53Updated 2 years ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆72Updated last week
- Open Source Vulnerability schema.☆206Updated last week
- Sharing software supply chain security open source projects☆52Updated 2 years ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆151Updated last year
- Manager of third-party sources of Semgrep rules 🗂☆87Updated last year
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆59Updated 3 years ago
- Fork Threat Modeling Platform - Community☆24Updated 5 months ago
- ☆113Updated 2 years ago
- A community collection of security reviews of open source software components.☆95Updated last year
- Static Token And Credential Scanner☆96Updated 2 years ago
- Dependency Combobulator☆93Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆66Updated 2 months ago
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆57Updated 3 months ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆78Updated last month
- CVSS2/3/4 library with interactive calculator for Python 2 and Python 3☆108Updated last month
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆40Updated 9 months ago
- Analyze any snippet, file, or repository to detect possible security flaws such as secret in code, open source vulnerability, code securi…☆78Updated last year
- Low-effort reachability analysis for third-party code vulnerabilities.☆21Updated 2 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆77Updated 2 weeks ago