Vulnogram / VulnogramLinks
Vulnogram is the tool for reserving, managing, and publishing CVEs. Get started at vulnogram.org or deploy Docker edition for full enterprise features.
☆207Updated this week
Alternatives and similar repositories for Vulnogram
Users that are interested in Vulnogram are comparing it to the libraries listed below
Sorting:
- A Python library and command line interface for CVE Services.☆70Updated last month
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆129Updated 3 months ago
- Tool to guess CPE name based on common software name☆106Updated 2 months ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆82Updated this week
- Stakeholder-Specific Vulnerability Categorization☆166Updated this week
- CVE.ICU code.☆47Updated this week
- Global Security Database☆315Updated last year
- A community collection of security reviews of open source software components.☆95Updated last year
- Software Component Verification Standard (SCVS)☆150Updated 7 months ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated last month
- Global Security Database Tools☆43Updated last year
- OWASP Foundation Threat Dragon Project Web Repository☆84Updated 2 weeks ago
- CVSS2/3/4 library with interactive calculator for Python 2 and Python 3☆109Updated 3 months ago
- VMC: a Scalable, Open Source and Free Vulnerability Management Platform☆91Updated 9 months ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆165Updated last week
- A project to visualize the software supply chain☆54Updated 2 years ago
- Monthly CVE Stats☆43Updated 2 weeks ago
- Desktop variant of OWASP Threat Dragon☆78Updated 4 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27Updated 6 years ago
- ☆127Updated last week
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆61Updated 5 months ago
- Core model including reused documentation☆99Updated 5 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆96Updated 9 months ago
- Official repository for the Open Vulnerability and Assessment Language☆79Updated last month
- Sample scan files for testing DefectDojo imports☆84Updated 2 months ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆167Updated last year
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated this week
- Computer Aided Integration of Requirements and Information Security - Server☆165Updated last week
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆92Updated last month
- Development of the NIST vulnerability data ontology (Vulntology).☆42Updated 2 weeks ago