CERTCC / Vulnerability-Data-ArchiveLinks
With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerability information in our vulnerability reports database. See also https://github.com/CERTCC/Vulnerability-Data-Archive-Tools
☆94Updated last year
Alternatives and similar repositories for Vulnerability-Data-Archive
Users that are interested in Vulnerability-Data-Archive are comparing it to the libraries listed below
Sorting:
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- Python API for the CVSS v3☆59Updated 4 years ago
- Vulnerability Information Aggregator for CVEs☆122Updated 6 years ago
- CVE Automation Working Group☆172Updated this week
- Python wrapper for the API of cve-search☆125Updated last year
- Tools for conducting analysis of CVE data in Elasticsearch☆74Updated 2 months ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- Tools to interact with APTnotes reporting/index.☆103Updated 4 years ago
- The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the O…☆76Updated 4 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆143Updated last month
- Legal, procedural and policies document templates for operating an IRT☆64Updated last year
- OASIS TC Open Repository: GitHub Pages site for STIX and TAXII☆98Updated 2 months ago
- A repository for OSSEC rules and decoders☆54Updated last year
- CVE Project Documentation☆82Updated last month
- CPE: Common Platform Enumeration for Python☆96Updated 9 months ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆52Updated 6 years ago
- Open Security Summit 2019☆26Updated 4 years ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 4 years ago
- Platform Firmware Auditing Tool☆131Updated 6 years ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆66Updated 4 years ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆81Updated 4 months ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆48Updated 5 years ago
- NVD/CVE as JSON files☆120Updated this week
- STIX Schema Development☆76Updated 6 years ago
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- Source for the STIX Documentation site☆45Updated 3 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆111Updated last year
- Tools for working with the CERT Vulnerability Data Archive. See also https://github.com/CERTCC/Vulnerability-Data-Archive☆21Updated last year
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 6 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated last week