CVEProject / cvelistV5Links
CVE cache of the official CVE List in CVE JSON 5 format
☆2,354Updated this week
Alternatives and similar repositories for cvelistV5
Users that are interested in cvelistV5 are comparing it to the libraries listed below
Sorting:
- Pilot program for CVE submission through GitHub. CVE Record Submission via Pilot PRs ending 6/30/2023☆1,491Updated 6 months ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,217Updated 2 weeks ago
- Open source vulnerability DB and triage service.☆2,405Updated this week
- A repo to conduct vulnerability enrichment.☆702Updated this week
- Zero shot vulnerability discovery using LLMs☆2,412Updated 10 months ago
- The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 350 common, vulnera…☆1,564Updated last week
- Open Adversarial Exposure Validation Platform☆1,444Updated this week
- Security vulnerability database inclusive of CVEs and GitHub originated security advisories from the world of open source software.☆2,061Updated this week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,687Updated last week
- LLM powered fuzzing via OSS-Fuzz.☆1,320Updated 3 weeks ago
- The Network Execution Tool☆4,981Updated last week
- Vulnerability scanner written in Go which uses the data provided by https://osv.dev☆8,127Updated this week
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,279Updated last week
- This repository is used for the development of the CVE JSON record format. Releases of the CVE JSON record format will also be published …☆374Updated last month
- Vulnerability Intelligence Platform☆2,340Updated this week
- Six Degrees of Domain Admin☆2,574Updated last week
- Gather and update all available and newest CVEs with their PoC.☆7,433Updated this week
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆11,494Updated this week
- A modular vulnerability scanner with automatic report generation capabilities.☆998Updated last week
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,735Updated 2 years ago
- Cybersecurity AI (CAI), the framework for AI Security☆5,979Updated last week
- An overview of LLMs for cybersecurity.☆1,137Updated last week
- cve-search - a tool to perform local searches for known vulnerabilities☆2,554Updated last week
- A curated list of large language model tools for cybersecurity research.☆478Updated last year
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆187Updated this week
- Volatility 3.0 development☆3,736Updated last week
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,289Updated 4 months ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆409Updated this week
- 🚀 Caido releases, wiki and roadmap☆1,967Updated this week
- Malware Configuration And Payload Extraction☆2,851Updated this week