CVEProject / cvelistV5Links
CVE cache of the official CVE List in CVE JSON 5 format
☆2,419Updated this week
Alternatives and similar repositories for cvelistV5
Users that are interested in cvelistV5 are comparing it to the libraries listed below
Sorting:
- Pilot program for CVE submission through GitHub. CVE Record Submission via Pilot PRs ending 6/30/2023☆1,493Updated 7 months ago
- A repo to conduct vulnerability enrichment.☆713Updated this week
- Security vulnerability database inclusive of CVEs and GitHub originated security advisories from the world of open source software.☆2,105Updated this week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,328Updated this week
- Open source vulnerability DB and triage service.☆2,451Updated this week
- Open Adversarial Exposure Validation Platform☆1,590Updated this week
- Zero shot vulnerability discovery using LLMs☆2,451Updated 11 months ago
- This repository is used for the development of the CVE JSON record format. Releases of the CVE JSON record format will also be published …☆384Updated 2 months ago
- Buttercup finds and patches software vulnerabilities☆1,434Updated this week
- ✨ Fully autonomous AI Agents system capable of performing complex penetration testing tasks☆941Updated last week
- A modular vulnerability scanner with automatic report generation capabilities.☆1,105Updated this week
- The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 350 common, vulnera…☆1,613Updated this week
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,299Updated this week
- Galah: An LLM-powered web honeypot.☆630Updated 5 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,203Updated 3 weeks ago
- 🚀 Caido releases, wiki and roadmap☆2,041Updated this week
- LLM powered fuzzing via OSS-Fuzz.☆1,352Updated 2 months ago
- Helping Ethical Hackers use LLMs in 50 Lines of Code or less..☆925Updated 4 months ago
- Gather and update all available and newest CVEs with their PoC.☆7,495Updated this week
- secator - the pentester's swiss knife☆1,226Updated this week
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,430Updated last year
- cve-search - a tool to perform local searches for known vulnerabilities☆2,575Updated last week
- Open Cyber Threat Intelligence Platform☆8,102Updated this week
- Malware Configuration And Payload Extraction☆2,934Updated this week
- Six Degrees of Domain Admin☆2,693Updated this week
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,136Updated last week
- A secure low code honeypot framework, leveraging AI for System Virtualization.☆1,810Updated last week
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆972Updated 2 weeks ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,083Updated 7 months ago
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆198Updated this week