RogoLabs / cve.icuView external linksLinks
CVE.ICU code.
☆50Updated this week
Alternatives and similar repositories for cve.icu
Users that are interested in cve.icu are comparing it to the libraries listed below
Sorting:
- KEV EPSS Data☆31Updated this week
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆19Jun 24, 2024Updated last year
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Global Security Database Tools☆43Dec 13, 2023Updated 2 years ago
- NVD API 2.0 client for CVE information☆13May 15, 2025Updated 9 months ago
- This is a mapping of CPEs to package urls created by using VulnerableCode's data☆10Aug 14, 2020Updated 5 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- CLI tool to validate CVE v5 JSON records.☆13May 14, 2025Updated 9 months ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- Analytics for Accounting logs from Network devices☆18Mar 27, 2021Updated 4 years ago
- A Github Action That Launches an NMap Scan Vulners Scan & Opens A Github Issue With The Findings☆17Dec 30, 2018Updated 7 years ago
- 🏃 Interface library for working with the Jira API☆14Jan 17, 2022Updated 4 years ago
- 64-bit Hobby OS (64-bit abandoned, check 32bit-old branch for the actual OS)☆14Mar 6, 2024Updated last year
- A CVE Heatmap Using CalPlot☆97Jan 25, 2021Updated 5 years ago
- A Quick POC To Show Why You Should Disable/Cover Your Webcam☆19Jun 23, 2016Updated 9 years ago
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Aug 31, 2018Updated 7 years ago
- Go tool for combining multiple different main packages into a single program or library☆22Feb 8, 2026Updated last week
- JSON schemas for validating CACAO Security Playbooks. Note: In December 2023, Cyentific AS offered and transferred the content of this re…☆19Dec 15, 2023Updated 2 years ago
- Lockheed Martin developed utility to compare two CycloneDX SBOMs☆19Oct 21, 2021Updated 4 years ago
- RISC-V Functional ISA Simulator☆20Jun 20, 2025Updated 7 months ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆64Jan 5, 2026Updated last month
- A repo to conduct vulnerability enrichment.☆720Updated this week
- Low-effort reachability analysis for third-party code vulnerabilities.☆22Jul 11, 2023Updated 2 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Command and Control that uses NTP as the transport protocol.☆26Jan 29, 2022Updated 4 years ago
- apt2sbom python package generates SPDX or CycloneDX files from Ubuntu APT and Python packaging information☆25Feb 4, 2022Updated 4 years ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- Stratosphere uses password generation algorithms to discover publicly accessible cloud storage buckets.☆31Jul 15, 2021Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 6 years ago
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆39Updated this week
- Global Security Database Project☆28Mar 4, 2023Updated 2 years ago
- A Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC☆32Feb 4, 2026Updated last week
- Go library for writing Go source code programatically☆38Feb 5, 2026Updated last week
- Finally, a commandline xpath tool for linux that is easy to use.☆30May 12, 2025Updated 9 months ago
- Visualizer for GUAC☆29Feb 5, 2026Updated last week
- ☆10Oct 6, 2025Updated 4 months ago
- Turn any blog into structured threat intelligence.☆51Feb 5, 2026Updated last week
- Universal Honey Pot☆29Aug 27, 2025Updated 5 months ago