Report missing advisories and corrections on OSS Index
☆17Jan 19, 2023Updated 3 years ago
Alternatives and similar repositories for vulns
Users that are interested in vulns are comparing it to the libraries listed below
Sorting:
- SIG Security - Software Bill of Materials☆19Aug 26, 2022Updated 3 years ago
- Provides content useful for IriusRisk threat modelling, including templates, API scripts, libraries and more.☆16Feb 10, 2026Updated last month
- A CLI that scans for sensitive data in source code☆14Mar 22, 2023Updated 2 years ago
- Library supporting secure keys, and crypto enabled JSON and CBOR☆16Mar 4, 2026Updated 2 weeks ago
- The Software Parts (SParts) lab delivers a Sawtooth-based ledger that provides both accountability and access to the open source componen…☆12Feb 20, 2020Updated 6 years ago
- OWASP Foundation Web Respository☆10Mar 14, 2026Updated last week
- The service side of clearlydefined.io☆50Updated this week
- Examples of using Snyk's SBOM APIs.☆16Sep 29, 2022Updated 3 years ago
- Learn AWS Security by Example☆22Apr 20, 2022Updated 3 years ago
- Evaluation Framework for Dependency Analysis (EFDA)☆44May 4, 2022Updated 3 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- docker build nessus with unlimited ip☆13Aug 23, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆23Feb 27, 2026Updated 3 weeks ago
- Kanban for GitHub Issues☆21Sep 26, 2019Updated 6 years ago
- This project aims to standardize the representation and management of EOL and EOS product information across the industry.☆30Mar 4, 2024Updated 2 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Unikernel applications framework☆13Jun 1, 2025Updated 9 months ago
- The purpose of the Metrics & Metadata (formerly Identifying Security Threats) working group is to enable stakeholders to have informed co…☆223Apr 23, 2024Updated last year
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Sep 16, 2025Updated 6 months ago
- Generate VEX (Vulnerability Exploitability Exchange) CycloneDX documents☆23Jan 19, 2025Updated last year
- CVE database☆21Sep 2, 2020Updated 5 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- Download raw (free) APKs from Google Play Store☆10Apr 26, 2018Updated 7 years ago
- ☆15May 17, 2018Updated 7 years ago
- Generate SoftWare IDentification (SWID) Tags according to ISO/IEC 19770-2:2015☆17Jul 12, 2025Updated 8 months ago
- VulnWhisperer Stack (ELK + VulnWhisperer + OpenVAS + Nessus)☆13Aug 14, 2018Updated 7 years ago
- GCP and GSUITE security auditing scripts☆27Apr 29, 2024Updated last year
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Jun 14, 2014Updated 11 years ago
- Visualizer for GUAC☆30Updated this week
- Practical Library Of Threats 4 Artificial Intelligence☆36Jun 19, 2025Updated 9 months ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- K8s - Admission controller for guarding namespace☆36Mar 20, 2021Updated 5 years ago
- Automated Tailscale Docker Build☆12Jan 7, 2022Updated 4 years ago
- My Fortify Docker Scripts☆12Mar 12, 2025Updated last year
- ☆41Jul 9, 2020Updated 5 years ago
- THIS REPOSITORY IS ARCHIVED i.e. please fork the project if you wish to develop it further☆35Aug 23, 2021Updated 4 years ago
- Build, edit, validate, and export CycloneDX BOMs through an intuitive browser-based interface☆15Mar 13, 2026Updated last week
- 🔒 OTP (One Time Password) utility in Java☆29Mar 15, 2025Updated last year