☆61Mar 10, 2026Updated last week
Alternatives and similar repositories for REST-API-wg
Users that are interested in REST-API-wg are comparing it to the libraries listed below
Sorting:
- A Vanilla Web Component wrapper for hCaptcha. Allows for easy integration with hCaptcha in many modern web frameworks.☆18Feb 20, 2026Updated last month
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- OWASP Benchmark Project Utilities - Provides scorecard generation and crawling tools for Benchmark style test suites.☆20Updated this week
- Exploit Prediction Scoring System (EPSS)☆31Jun 1, 2022Updated 3 years ago
- Matrix SDK for React Javascript☆17Oct 22, 2024Updated last year
- GitHub Repository for the HW CWE SIG☆17Mar 3, 2026Updated 2 weeks ago
- Android监控器(Activity异常destroy , 隐私政策合规)☆11Nov 18, 2021Updated 4 years ago
- Node.js .github metarepository☆20Apr 19, 2025Updated 11 months ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- A simple block explorer for nano (nanocurrency)☆14Jan 24, 2025Updated last year
- Bitcoin Duo: achieving consensus the safe way☆13Aug 20, 2015Updated 10 years ago
- ☆13Jun 15, 2024Updated last year
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Damn Simple Vulnerable Python Web Application☆18Jun 5, 2024Updated last year
- Get the default browser☆28Dec 19, 2023Updated 2 years ago
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆20Apr 1, 2018Updated 7 years ago
- 💥 Android multi-module task startup solution☆13Oct 22, 2021Updated 4 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆46Oct 1, 2025Updated 5 months ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆214Updated this week
- 基于UICrawler开源工程,开发的针对android APP 自动化遍历工具,针对hybird或者纯native APP,做深度优先遍历。主要用于监听被抓取APP的页面是否有变动,并生成diff报告☆14Mar 1, 2019Updated 7 years ago
- Detect repo language(s) with thin Python wrapper of Github Linguist☆14Nov 15, 2022Updated 3 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆93Feb 3, 2026Updated last month
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- Roma mobile☆13May 18, 2025Updated 10 months ago
- EPSS(Exploit Prediction Scoring System) API client☆20Oct 30, 2025Updated 4 months ago
- repository for curl build images☆12Jun 24, 2019Updated 6 years ago
- Perl module for integration with BMC Remedy Action Request System☆11Mar 14, 2017Updated 9 years ago
- An .mli-aware command-line renaming tool for OCaml projects☆10Jan 5, 2016Updated 10 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- 💻 My dotfiles. Probably of no interest to anyone else but me.☆14Mar 9, 2026Updated last week
- Completely manages a DokuWiki farm setup☆13Oct 6, 2025Updated 5 months ago
- [ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks☆13Mar 1, 2024Updated 2 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- Deploy the marketing analytics application, CRMint☆15Updated this week