aquasecurity / vuln-list
NVD, Ubuntu, Alpine
☆428Updated this week
Alternatives and similar repositories for vuln-list:
Users that are interested in vuln-list are comparing it to the libraries listed below
- ☆183Updated last week
- A set of tools to work with the feeds (vulnerabilities, CPE dictionary etc.) distributed by National Vulnerability Database (NVD)☆462Updated last year
- ☆265Updated last week
- Static Analysis Library for Containers☆198Updated last year
- Trivy's misconfiguration scanning engine☆218Updated 3 months ago
- Dependency Parser for Multiple Programming Languages☆148Updated 11 months ago
- Global Security Database☆318Updated last year
- Vulncode-DB project☆578Updated 3 years ago
- Tool for searching Exploits from Exploit Databases, etc.☆280Updated last week
- Scan is a free & Open Source DevSecOps tool for performing static analysis based security testing of your applications and its dependenci…☆839Updated last year
- awesome resources about cloud native security 🐿☆316Updated last year
- A container analysis and exploitation tool for pentesters and engineers.☆665Updated last year
- Build a local copy of CVE (NVD and Japanese JVN). Server mode for easy querying.☆390Updated last week
- Docker Image for CVE-Search☆106Updated 2 months ago
- Use Trivy as a plug-in vulnerability scanner in the Harbor registry☆221Updated 7 months ago
- Checks whether a Linux server according to security best practices as defined in the CIS Distribution-Independent Linux Benchmark☆171Updated 3 months ago
- NVD/CVE as JSON files☆116Updated this week
- Build a local copy of CPE(Common Platform Enumeration)☆102Updated this week
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆564Updated last month
- Vulnogram is a tool for creating and editing CVE information in CVE JSON format☆184Updated this week
- Open Source Vulnerability schema.☆200Updated this week
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆216Updated 3 months ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆114Updated last week
- Metarget is a framework providing automatic constructions of vulnerable infrastructures.☆1,235Updated 3 weeks ago
- Open Source Package Analysis☆833Updated 3 weeks ago
- Semgrep Community Edition rules, maintained by Semgrep and the community. Free to use under the Semgrep Rules License.☆903Updated this week
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆142Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆92Updated 2 months ago
- Scan systems with NMap and parse the output to a list of CVE's, CWE's and DPE's☆275Updated 5 years ago
- k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.☆289Updated 3 years ago