aquasecurity / vuln-listLinks
NVD, Ubuntu, Alpine
☆433Updated this week
Alternatives and similar repositories for vuln-list
Users that are interested in vuln-list are comparing it to the libraries listed below
Sorting:
- ☆183Updated this week
- A set of tools to work with the feeds (vulnerabilities, CPE dictionary etc.) distributed by National Vulnerability Database (NVD)☆463Updated last year
- ☆267Updated last week
- Static Analysis Library for Containers☆198Updated 2 years ago
- Dependency Parser for Multiple Programming Languages☆148Updated last year
- Global Security Database☆319Updated last year
- awesome resources about cloud native security 🐿☆321Updated last year
- Scan is a free & Open Source DevSecOps tool for performing static analysis based security testing of your applications and its dependenci…☆844Updated last year
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆217Updated 4 months ago
- Trivy's misconfiguration scanning engine☆218Updated 5 months ago
- Tool for searching Exploits from Exploit Databases, etc.☆285Updated this week
- Build a local copy of CVE (NVD and Japanese JVN). Server mode for easy querying.☆393Updated this week
- A repository with examples of CycloneDX BOMs (SBOM, SaaSBOM, OBOM, VEX, etc)☆196Updated 2 months ago
- A container analysis and exploitation tool for pentesters and engineers.☆666Updated last year
- Use Trivy as a plug-in vulnerability scanner in the Harbor registry☆223Updated 9 months ago
- Checks whether a Linux server according to security best practices as defined in the CIS Distribution-Independent Linux Benchmark☆173Updated 4 months ago
- Open Source Vulnerability schema.☆202Updated 3 weeks ago
- Semgrep Community Edition rules, maintained by Semgrep and the community. Free to use under the Semgrep Rules License.☆929Updated this week
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆120Updated last week
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆345Updated 3 months ago
- Vulncode-DB project☆580Updated 3 years ago
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆570Updated 2 months ago
- NVD/CVE as JSON files☆118Updated this week
- Build a local copy of CPE(Common Platform Enumeration)☆102Updated this week
- CIS Docker Benchmark - InSpec Profile☆510Updated 2 years ago
- ☆416Updated 2 years ago
- Vulnogram is a tool for creating and editing CVE information in CVE JSON format☆193Updated last month
- A comprehensive list of software composition analysis tools.☆148Updated last year
- k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.☆291Updated 3 years ago
- Greenbone Vulnerability Management Docker Image with OpenVAS☆249Updated 7 months ago