CVEProject / cvelistV5Links
CVE cache of the official CVE List in CVE JSON 5 format
☆2,150Updated this week
Alternatives and similar repositories for cvelistV5
Users that are interested in cvelistV5 are comparing it to the libraries listed below
Sorting:
- Pilot program for CVE submission through GitHub. CVE Record Submission via Pilot PRs ending 6/30/2023☆1,483Updated last month
- Navigate the CVE jungle with ease.☆2,045Updated last week
- A repo to conduct vulnerability enrichment.☆655Updated this week
- Zero shot vulnerability discovery using LLMs☆1,854Updated 5 months ago
- Security vulnerability database inclusive of CVEs and GitHub originated security advisories from the world of open source software.☆1,912Updated this week
- Open Adversary Exposure Validation Platform☆1,077Updated this week
- This repository is used for the development of the CVE JSON record format. Releases of the CVE JSON record format will also be published …☆331Updated last week
- The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 350 common, vulnera…☆1,458Updated this week
- The Network Execution Tool☆4,411Updated this week
- Open-source CVE monitoring and alerting platform☆2,093Updated this week
- Open source vulnerability DB and triage service.☆1,924Updated this week
- Digging Deeper....☆3,352Updated last week
- Sysmon for Linux☆1,913Updated last week
- cve-search - a tool to perform local searches for known vulnerabilities☆2,496Updated 2 weeks ago
- Open Source Package Analysis☆834Updated 3 months ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,098Updated 11 months ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆1,985Updated this week
- This repository contains the scanner component for Greenbone Community Edition.☆3,941Updated last week
- Threat-hunting tool for Linux☆938Updated last month
- An open source threat modeling tool from OWASP☆1,142Updated last week
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,526Updated last year
- A secure low code honeypot framework, leveraging LLM for System Virtualization.☆1,269Updated this week
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,348Updated 3 weeks ago
- CISO Assistant is a one-stop-shop for GRC, covering Risk, AppSec, Compliance/Audit Management, Privacy and supporting +100 frameworks wor…☆3,021Updated this week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆654Updated 3 months ago
- ☆2,369Updated this week
- Tools and Techniques for Blue Team / Incident Response☆3,196Updated 3 months ago
- secator - the pentester's swiss knife☆1,119Updated 3 weeks ago
- A curated list of large language model tools for cybersecurity research.☆465Updated last year
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,148Updated 3 weeks ago