Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
☆608Mar 12, 2026Updated last month
Alternatives and similar repositories for KEV
Users that are interested in KEV are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Agent responsible for network discovery and security auditing using Nmap.☆23Apr 21, 2026Updated 2 weeks ago
- Ostorlab Github Actions to complement your CI/CD with Security Testing.☆21Oct 2, 2025Updated 7 months ago
- Agent responsible for detecting remote vulnerabilities, a robust scanner.☆36Apr 30, 2026Updated last week
- OXO is a security scanning orchestrator for the modern age.☆568Updated this week
- ☆116Feb 11, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆36Jan 4, 2026Updated 4 months ago
- PoC for CVE-2024-27130☆38May 17, 2024Updated last year
- A repo to conduct vulnerability enrichment.☆766Updated this week
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆94Apr 15, 2026Updated 3 weeks ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆700Jan 6, 2026Updated 4 months ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,489Updated this week
- Gather and update all available and newest CVEs with their PoC.☆7,745Updated this week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆224Updated this week
- ☆13Sep 8, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 11 months ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,323Mar 25, 2026Updated last month
- #supply #chain #attack #detection☆653Updated this week
- Agent responsible for fast vulnerability scanning using Nuclei.☆11Apr 20, 2026Updated 2 weeks ago
- Live validation proxy tool for testing web app vulnerabilities☆854Mar 24, 2026Updated last month
- ☆315Jul 10, 2025Updated 9 months ago
- ☆66Jan 16, 2025Updated last year
- A modular vulnerability scanner with automatic report generation capabilities.☆1,165Updated this week
- ☆37Apr 6, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage…☆120Sep 30, 2025Updated 7 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,042Aug 23, 2025Updated 8 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Aug 16, 2024Updated last year
- Open-source security automation platform for teams and AI agents☆3,580Updated this week
- Customized CVE FEED Notifier☆112Apr 22, 2025Updated last year
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆181Dec 22, 2025Updated 4 months ago
- Pattern recognition for hosts, services, and content☆14Aug 19, 2022Updated 3 years ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,350Updated this week
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆229Apr 17, 2026Updated 3 weeks ago
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.☆1,192Updated this week
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Mar 18, 2023Updated 3 years ago
- The useful exploit finder☆824Jan 19, 2026Updated 3 months ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 4 years ago
- Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive an…☆1,129Updated this week