RedHatProductSecurity / cvss-v4-calculator
CVSS v4.0 calculator
☆35Updated last week
Related projects ⓘ
Alternatives and complementary repositories for cvss-v4-calculator
- CVSS v4.0 calculator☆24Updated 2 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆61Updated this week
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆40Updated last month
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆67Updated 6 months ago
- Stakeholder-Specific Vulnerability Categorization☆128Updated this week
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- ☆9Updated 2 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆48Updated this week
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆60Updated 7 months ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆46Updated 4 months ago
- CVSS (Common Vulnerability Scoring System) Calculator CVSSv3.1☆51Updated 4 years ago
- CVE.ICU code.☆34Updated this week
- CVSS2/3/4 library with interactive calculator for Python 2 and Python 3☆87Updated last week
- AT-AT (Attack Tree Analysis Tool) is a application that allows users to develop and analyze attack trees. The overall goal is to automati…☆22Updated 2 years ago
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆36Updated last year
- Tool to guess CPE name based on common software name☆76Updated 6 months ago
- Mirror - CIS Benchamarks☆39Updated 3 years ago
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆112Updated this week
- ☆30Updated 2 years ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆86Updated 9 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆137Updated last year
- OWASP Foundation Web Respository☆26Updated last year
- ☆42Updated last year
- OWASP Benchmark Project Utilities - Provides scorecard generation and crawling tools for Benchmark style test suites.☆16Updated this week
- CALDERA plugin for adversary emulation of AI-enabled systems☆85Updated last year
- Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆128Updated this week
- Vulnogram is a tool for creating and editing CVE information in CVE JSON format☆161Updated last week
- HASH (HTTP Agnostic Software Honeypot)☆128Updated 6 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆45Updated 5 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆125Updated 9 months ago