aquasecurity / vuln-listLinks
NVD, Ubuntu, Alpine
☆449Updated this week
Alternatives and similar repositories for vuln-list
Users that are interested in vuln-list are comparing it to the libraries listed below
Sorting:
- ☆190Updated last week
- A set of tools to work with the feeds (vulnerabilities, CPE dictionary etc.) distributed by National Vulnerability Database (NVD)☆469Updated 2 years ago
- ☆298Updated last week
- Global Security Database☆317Updated last year
- Static Analysis Library for Containers☆197Updated 2 years ago
- awesome resources about cloud native security 🐿☆323Updated 2 years ago
- Dependency Parser for Multiple Programming Languages☆148Updated last year
- Vulncode-DB project☆578Updated 4 years ago
- Build a local copy of CVE (NVD and Japanese JVN). Server mode for easy querying.☆406Updated last week
- Tool for searching Exploits from Exploit Databases, etc.☆294Updated last month
- Scan is a free & Open Source DevSecOps tool for performing static analysis based security testing of your applications and its dependenci…☆862Updated 2 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆674Updated 2 years ago
- NVD/CVE as JSON files☆124Updated this week
- Docker Image for CVE-Search☆119Updated 11 months ago
- Fully open-source SAST scanner supporting a range of languages and frameworks. Integrates with major CI pipelines and IDE such as Azure D…☆150Updated 5 years ago
- Checks whether a Linux server according to security best practices as defined in the CIS Distribution-Independent Linux Benchmark☆181Updated 2 weeks ago
- WAFBench (wb) is a tool to measure the performance of WAF(Web Application Firewall) . It's based on latest code of ab (ApacheBench), and …☆113Updated last month
- Trivy's misconfiguration scanning engine☆215Updated last year
- Open Source Vulnerability schema.☆227Updated last week
- Web Application Firewall Testing Framework - Go version☆162Updated this week
- Open Source Package Analysis☆862Updated 9 months ago
- Greenbone Vulnerability Management Docker Image with OpenVAS☆248Updated last year
- Use Trivy as a plug-in vulnerability scanner in the Harbor registry☆225Updated last year
- Command-line utility to scan the system and report on potential vulnerabilities, based on public CVE data☆269Updated last month
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆351Updated 10 months ago
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆221Updated last year
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆134Updated last week
- OWASP Benchmark is a test suite designed to verify the speed and accuracy of software vulnerability detection tools. A fully runnable web…☆767Updated this week
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆596Updated 9 months ago
- k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.☆301Updated 4 years ago