☆59Mar 30, 2026Updated last week
Alternatives and similar repositories for aibom-generator
Users that are interested in aibom-generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- It is almost the best 3B model in the current open source industry, surpassing Dolly v2-3b, open lama-3b, and even outperforming the Eleu…☆15Jul 24, 2023Updated 2 years ago
- Home of the ORC WG☆30Updated this week
- A set of utilities and tools to detect and search AI-generated code☆29May 30, 2025Updated 10 months ago
- Exploit Prediction Scoring System (EPSS)☆31Jun 1, 2022Updated 3 years ago
- Reference GitHub Workflows for SBOM generation from the CISA SBOM Generation Reference Implementation Tiger Team☆34Feb 2, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Repository for on-going work as part of the SBOM for AI Tiger Team effort.☆43Jul 28, 2025Updated 8 months ago
- A low-cost approach to testing AI chat experiences and security concepts☆40Jul 23, 2025Updated 8 months ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- ☆20Mar 25, 2023Updated 3 years ago
- This repository stores meetings minutes for the SPDX project☆40Apr 1, 2026Updated last week
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- A proof-of-concept SLSA provenance generator for Jenkins☆25Jul 29, 2024Updated last year
- The RISC-V Application Profiler is a Python-based tool designed to help software developers optimize the performance of their application…☆31Apr 23, 2025Updated 11 months ago
- AI risk ontology☆25Aug 1, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆16Updated this week
- Utility that converts SBOM documents from CycloneDX to SPDX☆33Jan 19, 2024Updated 2 years ago
- OWASP Foundation web repository☆63Mar 29, 2026Updated last week
- Security Harness Engineering for Robust Program Analysis☆122Jan 23, 2026Updated 2 months ago
- Improve Software Bill of Materials (SBOM) tooling and training to encourage adoption☆112Feb 28, 2026Updated last month
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- OASIS CSAF TC: Supporting version control for Work Product artifacts developed by members of TC, including prose specifications and secon…☆213Mar 16, 2026Updated 3 weeks ago
- Simple bash script that will optimize JPG and PNG images in a directory using jpegoptim, optipng, advpng, and pngcrush.☆11Sep 27, 2013Updated 12 years ago
- EPSS(Exploit Prediction Scoring System) API client☆20Oct 30, 2025Updated 5 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ⚙️ Converts NDJson format data into CSV☆21Dec 15, 2024Updated last year
- Public version of CNEPS☆23Dec 30, 2024Updated last year
- Claude Code on your Tailscale tailnet, powered by the iii engine.☆98Feb 26, 2026Updated last month
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆25Mar 9, 2026Updated last month
- The SunOS 3.4 source code. An very rare find!☆21Jan 4, 2023Updated 3 years ago
- ☆149Updated this week
- Uzbek cyrillic/latin alphabetic, upper/lower/capital-case, name/surname/patronymic wordlists (dictionaries) and their combinations☆12Aug 4, 2022Updated 3 years ago
- Tool to guess CPE name based on common software name☆120Mar 31, 2026Updated last week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Mar 12, 2026Updated 3 weeks ago
- Offensive Security & Red Teaming Labs and Projects☆26Aug 26, 2025Updated 7 months ago
- ☆20Jul 16, 2025Updated 8 months ago
- OVAL Documentation☆15Aug 4, 2017Updated 8 years ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago
- The model for the information captured in SPDX version 3 standard.☆99Mar 31, 2026Updated last week
- This project aims to standardize the representation and management of EOL and EOS product information across the industry.☆30Mar 4, 2024Updated 2 years ago