aquasecurity / vuln-listLinks
NVD, Ubuntu, Alpine
☆429Updated this week
Alternatives and similar repositories for vuln-list
Users that are interested in vuln-list are comparing it to the libraries listed below
Sorting:
- ☆182Updated this week
- ☆266Updated this week
- Static Analysis Library for Containers☆198Updated last year
- Global Security Database☆318Updated last year
- awesome resources about cloud native security 🐿☆317Updated last year
- Dependency Parser for Multiple Programming Languages☆148Updated 11 months ago
- Trivy's misconfiguration scanning engine☆218Updated 4 months ago
- A set of tools to work with the feeds (vulnerabilities, CPE dictionary etc.) distributed by National Vulnerability Database (NVD)☆461Updated last year
- Scan is a free & Open Source DevSecOps tool for performing static analysis based security testing of your applications and its dependenci…☆842Updated last year
- Checks whether a Linux server according to security best practices as defined in the CIS Distribution-Independent Linux Benchmark☆171Updated 4 months ago
- Use Trivy as a plug-in vulnerability scanner in the Harbor registry☆223Updated 8 months ago
- NVD/CVE as JSON files☆118Updated this week
- A container analysis and exploitation tool for pentesters and engineers.☆666Updated last year
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆569Updated 2 months ago
- Build a local copy of CVE (NVD and Japanese JVN). Server mode for easy querying.☆392Updated last week
- Open Source Vulnerability schema.☆199Updated last week
- Tool for searching Exploits from Exploit Databases, etc.☆282Updated last week
- Vulncode-DB project☆580Updated 3 years ago
- OWASP Benchmark is a test suite designed to verify the speed and accuracy of software vulnerability detection tools. A fully runnable web…☆713Updated this week
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆119Updated last week
- k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.☆291Updated 3 years ago
- A repository with examples of CycloneDX BOMs (SBOM, SaaSBOM, OBOM, VEX, etc)☆195Updated last month
- Vulnogram is a tool for creating and editing CVE information in CVE JSON format☆189Updated 3 weeks ago
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆215Updated 4 months ago
- CIS Docker Benchmark - InSpec Profile☆507Updated 2 years ago
- Metarget is a framework providing automatic constructions of vulnerable infrastructures.☆1,251Updated last month
- Greenbone Vulnerability Management Docker Image with OpenVAS☆247Updated 6 months ago
- GitHub Satellite 2020 workshops on finding security vulnerabilities with CodeQL for Java/JavaScript.☆210Updated 8 months ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆345Updated 2 months ago
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆186Updated last year