Stakeholder-Specific Vulnerability Categorization
☆180Apr 24, 2026Updated this week
Alternatives and similar repositories for SSVC
Users that are interested in SSVC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆84May 3, 2024Updated last year
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆22Apr 17, 2026Updated last week
- A repo to conduct vulnerability enrichment.☆759Updated this week
- This project aims to standardize the representation and management of EOL and EOS product information across the industry.☆30Mar 4, 2024Updated 2 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆100Apr 20, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆701Jan 6, 2026Updated 3 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆222Apr 22, 2026Updated last week
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- Exploit Prediction Scoring System (EPSS)☆31Jun 1, 2022Updated 3 years ago
- ☆20Jul 16, 2025Updated 9 months ago
- ☆102Sep 27, 2024Updated last year
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆26Mar 9, 2026Updated last month
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆43Nov 22, 2023Updated 2 years ago
- Development of the NIST vulnerability data ontology (Vulntology).☆43Nov 10, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Machine-readable specification for the attestation of security-relevant data.☆75Apr 17, 2026Updated last week
- CISA CSAF Security Advisories☆102Apr 21, 2026Updated last week
- OpenVEX Specification☆173Jan 16, 2026Updated 3 months ago
- Kaze's openly available CVE vulnerability data.☆16Apr 7, 2025Updated last year
- Build a local copy of CPE(Common Platform Enumeration)☆106Updated this week
- A lightweight library to sanitize data provided to AI tools☆28Apr 30, 2023Updated 2 years ago
- OASIS CSAF TC: Supporting version control for Work Product artifacts developed by members of TC, including prose specifications and secon…☆214Updated this week
- The difference between exploitation prediction and detection is akin to the difference between detecting a missile launch or a detonation…☆13Apr 11, 2026Updated 2 weeks ago
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆94Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Technical Advisory Council☆141Apr 14, 2026Updated 2 weeks ago
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆608Feb 10, 2026Updated 2 months ago
- Automating Compliance Tooling Project☆24Jan 28, 2022Updated 4 years ago
- ☆16Apr 30, 2023Updated 2 years ago
- Vulnogram is the tool for reserving, managing, and publishing CVEs. Get started at vulnogram.org or deploy Docker edition for full enterp…☆218Apr 13, 2026Updated 2 weeks ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆24Jun 13, 2023Updated 2 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆245Apr 3, 2024Updated 2 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated 2 months ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Dec 10, 2025Updated 4 months ago
- Utility that provides an API platform for validating, querying and managing BOM data☆136Jan 2, 2026Updated 3 months ago
- KEV EPSS Data☆33Updated this week
- ☆18Updated this week
- CVE Automation Working Group☆184Apr 22, 2026Updated last week
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆103Mar 6, 2026Updated last month
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆25Apr 21, 2026Updated last week