CERTCC / SSVCLinks
Stakeholder-Specific Vulnerability Categorization
☆159Updated last week
Alternatives and similar repositories for SSVC
Users that are interested in SSVC are comparing it to the libraries listed below
Sorting:
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week
- CISA CSAF Security Advisories☆82Updated this week
- ☆47Updated this week
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆161Updated last week
- VulnCheck's official command line tool☆136Updated this week
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆88Updated 2 weeks ago
- ☆120Updated last week
- ☆16Updated 2 years ago
- Global Security Database Tools☆43Updated last year
- ☆19Updated 3 weeks ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆185Updated last year
- OASIS CSAF TC: Supporting version control for Work Product artifacts developed by members of TC, including prose specifications and secon…☆184Updated this week
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆70Updated last week
- ☆86Updated 10 months ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 2 months ago
- OWASP Foundation Web Respository☆31Updated 2 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆74Updated this week
- App that simplifies building decision trees to model adverse scenarios☆216Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆175Updated 9 months ago
- ☆18Updated last month
- Mirror of cisa.gov/kev data files☆54Updated this week
- Repository for the Open Information Security Risk Universe☆64Updated 3 years ago
- OASIS TC Open Repository: A GitHub repository for management of non-normative information about the work of the CSAF Technical Committee,…☆21Updated last week
- Threat Modeling Manifesto☆29Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆95Updated 6 months ago
- CVE.ICU code.☆46Updated last week
- Core model including reused documentation☆98Updated 2 months ago
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆195Updated 3 weeks ago