CVSS (Common Vulnerability Scoring System) Calculator CVSSv3.1
☆54Oct 20, 2020Updated 5 years ago
Alternatives and similar repositories for cvss
Users that are interested in cvss are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Common Vulnerability Scoring System (CVSS) base score calculator and validator library written in TypeScript.☆15Dec 5, 2025Updated 3 months ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Mar 6, 2026Updated 3 weeks ago
- Python API for the CVSS v3☆58May 28, 2021Updated 4 years ago
- Configuration Language for Mortals☆12Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 4 years ago
- Token impersonation in PowerShell to execute under the context of another user.☆24Oct 14, 2025Updated 5 months ago
- According to all known laws of aviation, there is no way a bee should be able to fly. Its wings are too small to get its fat little body …☆25Aug 11, 2021Updated 4 years ago
- Development of the NIST vulnerability data ontology (Vulntology).☆43Nov 10, 2025Updated 4 months ago
- ☆14Dec 3, 2022Updated 3 years ago
- ☆13Aug 17, 2016Updated 9 years ago
- CVSS v4.0 calculator☆51May 21, 2025Updated 10 months ago
- A CommonJS library for working with Common Vulnerability Scoring System vectors and scores.☆12Jul 14, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- CVSS (Common Vulnerability Scoring System) v3.1 Javascript calculator toolkit☆66Aug 23, 2024Updated last year
- Security tools, scanners, exploit code☆31Oct 21, 2017Updated 8 years ago
- A python library for automating security scans.☆18Mar 19, 2021Updated 5 years ago
- Supplementary material for MSR2017 paper Structure and Evolution of Package Dependency Networks☆18Oct 8, 2018Updated 7 years ago
- Implementation of Korean Block Ciphers: NEAT and NES☆31Jun 19, 2017Updated 8 years ago
- Ruggedy Vulnerability Management App☆14Dec 8, 2019Updated 6 years ago
- Kali Linux, built from initial Debian Jessie, using Vagrant, for deployment to Amazon☆17Dec 10, 2016Updated 9 years ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- Wrap any binary into a cached webserver☆60Apr 5, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- OWASP Foundation Web Respository☆20Oct 8, 2025Updated 5 months ago
- ☆14Aug 27, 2022Updated 3 years ago
- Simple C++ PoC of SeDebugPrivilege Privesc☆31Feb 12, 2024Updated 2 years ago
- This package provides a python implementation of the Atlassian Service to Service Authentication specification.☆25Mar 16, 2026Updated 2 weeks ago
- Like rc but better ;)☆11Jun 21, 2017Updated 8 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- Movie example for the golang neo4j bolt driver☆17Aug 16, 2016Updated 9 years ago
- ☆40Aug 25, 2018Updated 7 years ago
- The standard ADB Configuration involves a USB Connection to a physical Device. If you prefer, you can switch over to TCP/IP Mode and conn…☆19Nov 4, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Webkit uxss exploit (CVE-2017-7089)☆63Oct 3, 2017Updated 8 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- ☆16Mar 23, 2026Updated last week
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆192Sep 8, 2024Updated last year
- 💰 Member dues and Donations platform☆12Mar 16, 2023Updated 3 years ago
- Shell intended for forwarding-only ssh connection via jumphost☆11Jun 27, 2018Updated 7 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago