FIRSTdotorg / cvss-v4-calculator
CVSS v4.0 calculator
☆25Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for cvss-v4-calculator
- Exploit Prediction Scoring System (EPSS)☆23Updated 2 years ago
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆36Updated last year
- Global Security Database Tools☆41Updated 11 months ago
- Stakeholder-Specific Vulnerability Categorization☆130Updated this week
- CVSS v4.0 calculator☆36Updated 3 weeks ago
- OWASP Foundation Web Respository☆27Updated last year
- Threat Modeling Manifesto☆27Updated 4 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆68Updated 6 months ago
- OWASP Foundation Web Respository☆10Updated last year
- Secvisogram is a web tool for creating and editing security advisories in the CSAF 2.0 format☆33Updated last week
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆48Updated this week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆61Updated this week
- The Secure Coding Framework☆20Updated 4 years ago
- OWASP Foundation Web Respository☆27Updated 3 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆42Updated 2 weeks ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆85Updated last year
- DefectDojo Community Content☆17Updated last month
- ☆81Updated this week
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 6 months ago
- A Python library and command line interface for CVE Services.☆58Updated 3 weeks ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆45Updated 5 months ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆17Updated last month
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 9 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated last year
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆136Updated this week
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆43Updated last month
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆55Updated 4 months ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆93Updated 2 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆86Updated 9 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆56Updated last month