☆57Mar 2, 2026Updated 2 weeks ago
Alternatives and similar repositories for aibom-generator
Users that are interested in aibom-generator are comparing it to the libraries listed below
Sorting:
- A command-line interface tool for creating, managing, and verifying Content Provenance and Authenticity (C2PA) manifests for machine lear…☆21Updated this week
- It is almost the best 3B model in the current open source industry, surpassing Dolly v2-3b, open lama-3b, and even outperforming the Eleu…☆15Jul 24, 2023Updated 2 years ago
- Home of the ORC WG☆29Updated this week
- A set of utilities and tools to detect and search AI-generated code☆28May 30, 2025Updated 9 months ago
- Kubernetes controller to validate AI models☆27Mar 10, 2026Updated last week
- Exploit Prediction Scoring System (EPSS)☆31Jun 1, 2022Updated 3 years ago
- Repository for on-going work as part of the SBOM for AI Tiger Team effort.☆42Jul 28, 2025Updated 7 months ago
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated last month
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- ☆17Jul 21, 2025Updated 8 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- OWASP Foundation web repository☆59Updated this week
- AI risk ontology☆23Aug 1, 2025Updated 7 months ago
- Source for official CVE Program policy documents.☆18Jan 28, 2026Updated last month
- ☆16Updated this week
- Browser based Privacy Aware SBoM Exploration☆28Dec 31, 2025Updated 2 months ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Security Harness Engineering for Robust Program Analysis☆117Jan 23, 2026Updated last month
- Vulnerability Management tool using the CVE-Search database☆10Apr 22, 2016Updated 9 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- A taxonomy of all official CycloneDX property namespaces and names☆21Mar 2, 2026Updated 2 weeks ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- A python library / model for creating co-references between AMR graph nodes.☆11Dec 11, 2022Updated 3 years ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- OASIS CSAF TC: Supporting version control for Work Product artifacts developed by members of TC, including prose specifications and secon…☆211Updated this week
- Simple bash script that will optimize JPG and PNG images in a directory using jpegoptim, optipng, advpng, and pngcrush.☆11Sep 27, 2013Updated 12 years ago
- EPSS(Exploit Prediction Scoring System) API client☆20Oct 30, 2025Updated 4 months ago
- The System Package Data Exchange (SPDX) specification in Markdown and HTML formats.☆361Mar 11, 2026Updated last week
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆25Mar 9, 2026Updated last week
- ☆147Updated this week
- The SunOS 3.4 source code. An very rare find!☆21Jan 4, 2023Updated 3 years ago
- The OVAL Language Sandbox☆44Jan 25, 2021Updated 5 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- Tool to guess CPE name based on common software name☆117Feb 11, 2026Updated last month
- A framework for building behaviour-driven tests in fluent Java.☆35Mar 27, 2020Updated 5 years ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Mar 12, 2026Updated last week
- Offensive Security & Red Teaming Labs and Projects☆26Aug 26, 2025Updated 6 months ago
- ☆20Jul 16, 2025Updated 8 months ago