CVEProject / cvelistV5Links
CVE cache of the official CVE List in CVE JSON 5 format
☆2,278Updated this week
Alternatives and similar repositories for cvelistV5
Users that are interested in cvelistV5 are comparing it to the libraries listed below
Sorting:
- A repo to conduct vulnerability enrichment.☆689Updated this week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,125Updated 2 weeks ago
- Zero shot vulnerability discovery using LLMs☆2,360Updated 8 months ago
- Cybersecurity AI (CAI), the framework for AI Security☆4,844Updated this week
- Open Adversary Exposure Validation Platform☆1,421Updated this week
- Vulnerability Intelligence Platform☆2,302Updated 3 weeks ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,236Updated this week
- Open source vulnerability DB and triage service.☆2,352Updated this week
- OWASP dep-scan is a next-generation security and risk audit tool based on known vulnerabilities, advisories, and license limitations for …☆1,172Updated 2 weeks ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,606Updated this week
- The Network Execution Tool☆4,837Updated this week
- The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 350 common, vulnera…☆1,530Updated last week
- Security vulnerability database inclusive of CVEs and GitHub originated security advisories from the world of open source software.☆2,019Updated this week
- Volatility 3.0 development☆3,604Updated last week
- This repository contains the scanner component for Greenbone Community Edition.☆4,116Updated last week
- Helping Ethical Hackers use LLMs in 50 Lines of Code or less..☆847Updated last month
- A curated list of awesome YARA rules, tools, and people.☆4,044Updated 7 months ago
- This repository is used for the development of the CVE JSON record format. Releases of the CVE JSON record format will also be published …☆363Updated 3 weeks ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,186Updated 3 weeks ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,252Updated 3 weeks ago
- Six Degrees of Domain Admin☆2,462Updated this week
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆4,120Updated last week
- Automated Adversary Emulation Platform☆6,493Updated last week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆677Updated 3 weeks ago
- Malware Configuration And Payload Extraction☆2,760Updated this week
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,087Updated this week
- Open Cyber Threat Intelligence Platform☆7,885Updated this week
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆11,072Updated this week
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,729Updated 2 years ago
- Gather and update all available and newest CVEs with their PoC.☆7,281Updated last week