The JSON REST API for the National Vulnerability Database
☆24Dec 26, 2022Updated 3 years ago
Alternatives and similar repositories for nvdapi
Users that are interested in nvdapi are comparing it to the libraries listed below
Sorting:
- FT8 transmitter for Raspberry PI (w/ WSPR shield)☆21Jan 28, 2021Updated 5 years ago
- ☆16Sep 12, 2018Updated 7 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- Football prediction script on a flask webpage☆11Jan 10, 2025Updated last year
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- Analog Watch/Clock with Arduino and and ST7789 IPS☆10Feb 8, 2020Updated 6 years ago
- Node.js SDK for IBM X-Force Exchange☆15Aug 20, 2018Updated 7 years ago
- ☆10Dec 23, 2014Updated 11 years ago
- The web-888 web server code, Clone from kiwisdr with lots of changes☆44Feb 5, 2026Updated last month
- CLI tool to analyze PE files☆90Sep 23, 2024Updated last year
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- EBAZ4205 Board FPGA project☆14Oct 20, 2023Updated 2 years ago
- WSPR-zero turns a Raspberry Pi Zero into a WSPR transmitter and receiver perfect for traveling.☆12Nov 7, 2025Updated 3 months ago
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- Linux integrity monitoring for CentOS/RHEL☆12May 13, 2020Updated 5 years ago
- ☆35Feb 6, 2026Updated 3 weeks ago
- A customized translator for Regular Expressions, modeled after the ease and usability of Google Translate☆12Jan 12, 2023Updated 3 years ago
- Framework for Rogue Wi-Fi Access Point Attack☆12Aug 31, 2015Updated 10 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- This is a demodulator multimode AM SSB CW for quadrature input signal (es. taken from ElkSDR-UNO receiver or QRPLab Receiver o similar).☆12May 4, 2025Updated 10 months ago
- Tron wallet☆10Feb 11, 2022Updated 4 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- ☆11Jul 10, 2024Updated last year
- Raspberry Pi Pico frequency divider☆14Nov 21, 2021Updated 4 years ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- 3D modeling projects implemented while learning & experimenting with FreeCAD☆13Jun 4, 2021Updated 4 years ago
- ☆13Feb 8, 2021Updated 5 years ago
- Repository for Scarf's documentation website☆10Feb 25, 2026Updated last week
- ☆11Apr 18, 2022Updated 3 years ago
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- 一种用于序列标注任务的数据标注(分词,NER)的工具☆11Jun 3, 2020Updated 5 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- A CommonJS library for working with Common Vulnerability Scoring System vectors and scores.☆12Jul 14, 2022Updated 3 years ago
- NVD API 2.0 for python☆12Sep 26, 2024Updated last year
- ☆12Sep 18, 2015Updated 10 years ago
- ☆10Mar 5, 2018Updated 8 years ago
- H4ck33D – hacking a 433MHz Remote Control☆10Sep 30, 2015Updated 10 years ago