OWASP Foundation Web Respository
☆32Oct 11, 2025Updated 6 months ago
Alternatives and similar repositories for www-project-vulnerability-management-guide
Users that are interested in www-project-vulnerability-management-guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- Incident Response Report Using GitHub-Sphinx☆21Oct 28, 2019Updated 6 years ago
- Vulnerability Management tool using the CVE-Search database☆10Apr 22, 2016Updated 9 years ago
- OWASP Foundation Web Respository☆22Oct 9, 2025Updated 6 months ago
- Multi-threading Leaks/Intelligence file parser☆16Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆23Updated this week
- Kaze's openly available CVE vulnerability data.☆16Apr 7, 2025Updated last year
- Generate xBOMs enriched with AI, SaaS, Crypto and more using Static Code Analysis☆28Jan 22, 2026Updated 2 months ago
- ☆27Nov 25, 2025Updated 4 months ago
- A gitleaks config that has most of Microsoft's deprecated credscan rules ported to it.☆13Apr 3, 2022Updated 4 years ago
- Library to consume project Open Source Insights Project from Google☆15Aug 24, 2024Updated last year
- Agile Threat Modeling as Code☆13Jun 30, 2022Updated 3 years ago
- Microcorruption CTF☆12Jan 17, 2016Updated 10 years ago
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆178Mar 1, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- Linux Device Drivers 3 examples updated to work in recent kernels☆25May 6, 2012Updated 13 years ago
- RegVuln is a tool that use Engine Trivy to generate reports about images Docker from Registry, have integration with Defect Dojo to Vulne…☆16Aug 7, 2024Updated last year
- A very fast network scanner of SSL server configurations☆11Mar 28, 2016Updated 10 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 10 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆84May 3, 2024Updated last year
- Report on quality of SBOM contents☆25Dec 18, 2024Updated last year
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- Home for TRANSITS materials☆25Jul 24, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Rapid Response sample Foundry app☆17Updated this week
- This repository is simply documenting the installation of the MagicMirror2 program on a Linux distro, not a Raspberry Pi.☆14Oct 21, 2020Updated 5 years ago
- Integration tools for TheHive and Azure Sentinel☆13Sep 23, 2020Updated 5 years ago
- Project LLM Verification Standard☆55Oct 6, 2025Updated 6 months ago
- Simple DLP monitor for AWS S3 is a tool built on top of CloudWatch events and Lambda functions to alert you when data is transferred to S…☆18Mar 4, 2020Updated 6 years ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆152Jul 9, 2025Updated 9 months ago
- Useful cyber security and digital forensics resources☆17Oct 20, 2020Updated 5 years ago
- This article documents the thought process and steps involved in refactoring a distributed monolith to microservices. We are going to rem…☆15Jul 30, 2020Updated 5 years ago
- Cybersecurity Incident Response Plan☆111Oct 2, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Ruggedy Vulnerability Management App☆14Dec 8, 2019Updated 6 years ago
- 🗳A voting app that keeps votes in a blockchain. Build using Next.js ▲, Firebase 🔥Tailwind.css 💨and WebRTC 🗣☆13Dec 9, 2022Updated 3 years ago
- OWASP Foundation Web Respository☆168Mar 30, 2026Updated 2 weeks ago
- Minimal Docker image with Nmap Network Security Scanner pre-installed.☆12Dec 5, 2025Updated 4 months ago
- This repository contain some datas about CVE's updated hourly, to help community Prioritize, based in sources the Threat Intelligence in …☆31Updated this week
- CodeQL and Binary Ninja scripts to accompany the blog post☆11Feb 3, 2023Updated 3 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago