aquasecurity / vuln-listLinks
NVD, Ubuntu, Alpine
☆429Updated this week
Alternatives and similar repositories for vuln-list
Users that are interested in vuln-list are comparing it to the libraries listed below
Sorting:
- ☆182Updated this week
- ☆266Updated this week
- A set of tools to work with the feeds (vulnerabilities, CPE dictionary etc.) distributed by National Vulnerability Database (NVD)☆461Updated last year
- Static Analysis Library for Containers☆198Updated last year
- Dependency Parser for Multiple Programming Languages☆148Updated 11 months ago
- Global Security Database☆318Updated last year
- Checks whether a Linux server according to security best practices as defined in the CIS Distribution-Independent Linux Benchmark☆171Updated 4 months ago
- awesome resources about cloud native security 🐿☆317Updated last year
- A container analysis and exploitation tool for pentesters and engineers.☆666Updated last year
- Trivy's misconfiguration scanning engine☆218Updated 4 months ago
- Open Source Vulnerability schema.☆199Updated last week
- Tool for searching Exploits from Exploit Databases, etc.☆282Updated last week
- Scan is a free & Open Source DevSecOps tool for performing static analysis based security testing of your applications and its dependenci…☆841Updated last year
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,171Updated 4 months ago
- Open Source Package Analysis☆834Updated last month
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆345Updated 2 months ago
- Build a local copy of CVE (NVD and Japanese JVN). Server mode for easy querying.☆392Updated last week
- Vulncode-DB project☆580Updated 3 years ago
- ☆248Updated 8 months ago
- Use Trivy as a plug-in vulnerability scanner in the Harbor registry☆223Updated 8 months ago
- Generic SAST Library☆131Updated 6 months ago
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆215Updated 4 months ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆144Updated last year
- k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.☆291Updated 3 years ago
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆569Updated 2 months ago
- CVSS2/3/4 library with interactive calculator for Python 2 and Python 3☆99Updated last week
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆119Updated last week
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆310Updated this week
- A comprehensive list of software composition analysis tools.☆147Updated last year
- Evaluation Framework for Dependency Analysis (EFDA)☆43Updated 3 years ago