Stakeholder-Specific Vulnerability Categorization
☆173Updated this week
Alternatives and similar repositories for SSVC
Users that are interested in SSVC are comparing it to the libraries listed below
Sorting:
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83May 3, 2024Updated last year
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆23Jan 21, 2026Updated last month
- This project aims to standardize the representation and management of EOL and EOS product information across the industry.☆30Mar 4, 2024Updated last year
- A repo to conduct vulnerability enrichment.☆733Updated this week
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆89Feb 3, 2026Updated 3 weeks ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆215Feb 20, 2026Updated last week
- ☆102Sep 27, 2024Updated last year
- ☆20Jul 16, 2025Updated 7 months ago
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆43Nov 22, 2023Updated 2 years ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆690Jan 6, 2026Updated last month
- Build a local copy of CPE(Common Platform Enumeration)☆105Updated this week
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated this week
- Exploit Prediction Scoring System (EPSS)☆31Jun 1, 2022Updated 3 years ago
- CISA CSAF Security Advisories☆96Updated this week
- Machine-readable specification for the attestation of security-relevant data.☆72Updated this week
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- Vulnogram is the tool for reserving, managing, and publishing CVEs. Get started at vulnogram.org or deploy Docker edition for full enterp…☆215Updated this week
- OASIS CSAF TC: Supporting version control for Work Product artifacts developed by members of TC, including prose specifications and secon…☆210Updated this week
- A Python-based client for the Cisco openVuln API☆38Nov 9, 2025Updated 3 months ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- OpenVEX Specification☆168Jan 16, 2026Updated last month
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆24Updated this week
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆603Feb 10, 2026Updated 2 weeks ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆96Feb 18, 2026Updated last week
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆91Feb 20, 2026Updated last week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆471Updated this week
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 2 months ago
- Utility that provides an API platform for validating, querying and managing BOM data☆127Jan 2, 2026Updated last month
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆240Apr 3, 2024Updated last year
- A repository with examples of CycloneDX BOMs (SBOM, SaaSBOM, OBOM, VEX, etc)☆218Oct 21, 2025Updated 4 months ago
- Secvisogram is a web tool for creating and editing security advisories in the CSAF 2.0 format☆41Feb 18, 2026Updated last week
- Automating Compliance Tooling Project☆22Jan 28, 2022Updated 4 years ago
- Development of the NIST vulnerability data ontology (Vulntology).☆43Nov 10, 2025Updated 3 months ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- apt2sbom python package generates SPDX or CycloneDX files from Ubuntu APT and Python packaging information☆25Feb 4, 2022Updated 4 years ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago