OWASP Foundation Web Respository
☆33Apr 17, 2026Updated 3 weeks ago
Alternatives and similar repositories for www-project-vulnerability-management-guide
Users that are interested in www-project-vulnerability-management-guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerability Management tool using the CVE-Search database☆10Apr 22, 2016Updated 10 years ago
- OWASP Foundation Web Respository☆22Oct 9, 2025Updated 6 months ago
- OWASP Foundation web repository☆24Updated this week
- Multi-threading Leaks/Intelligence file parser☆16Updated this week
- Kaze's openly available CVE vulnerability data.☆16Apr 7, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Meraki monitoring through Zabbix☆10Jul 31, 2023Updated 2 years ago
- Zabbix ping remote hosts over mtr☆14Jul 9, 2022Updated 3 years ago
- Generate xBOMs enriched with AI, SaaS, Crypto and more using Static Code Analysis☆29Jan 22, 2026Updated 3 months ago
- ☆29Nov 25, 2025Updated 5 months ago
- ☆19Feb 3, 2026Updated 3 months ago
- A gitleaks config that has most of Microsoft's deprecated credscan rules ported to it.☆13Apr 3, 2022Updated 4 years ago
- Agile Threat Modeling as Code☆13Jun 30, 2022Updated 3 years ago
- Library to consume project Open Source Insights Project from Google☆15Aug 24, 2024Updated last year
- PowerShell Module for interacting with Redis caches☆14Jul 7, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Collection of reusable references☆14Updated this week
- DrayTek Vigor password recovery, config & firmware tools☆11Jul 18, 2015Updated 10 years ago
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆177Mar 1, 2026Updated 2 months ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- RegVuln is a tool that use Engine Trivy to generate reports about images Docker from Registry, have integration with Defect Dojo to Vulne…☆16Aug 7, 2024Updated last year
- A very fast network scanner of SSL server configurations☆11Mar 28, 2016Updated 10 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 11 months ago
- Zabbix template for DmOS Datacom network equipments☆14Sep 19, 2025Updated 7 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Azure zabbix template samples.☆13Dec 29, 2018Updated 7 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆84May 3, 2024Updated 2 years ago
- A little app to provide sidetone in headphones from a mic☆13Oct 17, 2020Updated 5 years ago
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- Demo showing how to build a good software supply chain from operations -> Middleware -> Develoeprs/Application Owners☆16Oct 28, 2020Updated 5 years ago
- Rapid Response sample Foundry app☆17Apr 23, 2026Updated 2 weeks ago
- This repository is simply documenting the installation of the MagicMirror2 program on a Linux distro, not a Raspberry Pi.☆14Oct 21, 2020Updated 5 years ago
- Integration tools for TheHive and Azure Sentinel☆13Sep 23, 2020Updated 5 years ago
- ☆30Mar 3, 2021Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Simple DLP monitor for AWS S3 is a tool built on top of CloudWatch events and Lambda functions to alert you when data is transferred to S…☆18Mar 4, 2020Updated 6 years ago
- Cyber competition scoring engine☆17Jun 15, 2016Updated 9 years ago
- UI theme for Atom, also dark with vibrant colors.☆16Oct 29, 2017Updated 8 years ago
- Useful cyber security and digital forensics resources☆19Oct 20, 2020Updated 5 years ago
- Threats Manager Platform Core libraries and SDK☆76Dec 22, 2025Updated 4 months ago
- Cybersecurity Incident Response Plan☆111Oct 2, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆170Updated this week