RedHatProductSecurity / cvss-v4-calculator
CVSS v4.0 calculator
☆38Updated last month
Alternatives and similar repositories for cvss-v4-calculator:
Users that are interested in cvss-v4-calculator are comparing it to the libraries listed below
- CVSS v4.0 calculator☆29Updated 8 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆74Updated 11 months ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆50Updated 9 months ago
- Monthly CVE Stats☆43Updated 3 weeks ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆194Updated this week
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆59Updated last week
- boostsecurityio/lotp☆123Updated 2 weeks ago
- CVE.ICU code.☆41Updated this week
- HASH (HTTP Agnostic Software Honeypot)☆139Updated 11 months ago
- ☆41Updated 2 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆133Updated 3 weeks ago
- ☆110Updated last year
- Stakeholder-Specific Vulnerability Categorization☆147Updated last week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆139Updated 3 months ago
- Mirror of cisa.gov/kev data files☆46Updated last week
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆133Updated last year
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆70Updated 2 years ago
- A full insecure kubernetes application for testing security tools☆70Updated this week
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 6 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆72Updated last week
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- A catalog of services that can be publicly exposed within different cloud providers.☆14Updated 7 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆93Updated last year
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆116Updated 2 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆63Updated last year
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆141Updated 2 years ago
- Tool to guess CPE name based on common software name☆93Updated 5 months ago
- Tool for obfuscating and deobfuscating data.☆70Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆75Updated 3 weeks ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 2 months ago