CISA CSAF Security Advisories
☆104Apr 24, 2026Updated last week
Alternatives and similar repositories for CSAF
Users that are interested in CSAF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- A repo to conduct vulnerability enrichment.☆759Updated this week
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆33Sep 4, 2024Updated last year
- OASIS TC Open Repository: A GitHub repository for management of non-normative information about the work of the CSAF Technical Committee,…☆21Apr 27, 2026Updated last week
- OASIS CSAF TC: Supporting version control for Work Product artifacts developed by members of TC, including prose specifications and secon…☆215Updated this week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Secvisogram is a web tool for creating and editing security advisories in the CSAF 2.0 format☆43Updated this week
- OASIS OpenEoX TC: The purpose of this repository is to support version control for Work Product artifacts developed by members of the OAS…☆52Apr 17, 2026Updated 2 weeks ago
- CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and …☆75Nov 20, 2024Updated last year
- Stakeholder-Specific Vulnerability Categorization☆180Updated this week
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- Powershell script for Windows to retrieve the authentication hardening status of DCOM applications☆23Jan 15, 2023Updated 3 years ago
- ☆11Jan 28, 2025Updated last year
- ☆74Apr 3, 2025Updated last year
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆25Apr 28, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆19Jun 24, 2024Updated last year
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago
- Secvisogram is a web tool for creating and editing security advisories in the CSAF 2.0 format☆31Apr 22, 2026Updated last week
- A Python client for the Global CVE Allocation System.☆18Mar 26, 2026Updated last month
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆36Feb 9, 2025Updated last year
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆93Jun 19, 2024Updated last year
- Utility that converts SBOM documents from CycloneDX to SPDX☆33Jan 19, 2024Updated 2 years ago
- Rulezet is an open-source web platform for sharing, evaluating, improving, and managing cybersecurity detection rules (YARA, Sigma, Suric…☆48Updated this week
- Build, edit, validate, and export CycloneDX BOMs through an intuitive browser-based interface☆19Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Labeled vulnerability-package match pairs used as ground truth to evaluate vulnerability scanners☆14Updated this week
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 8 months ago
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆94Updated this week
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Multi-threading Leaks/Intelligence file parser☆16Apr 20, 2026Updated 2 weeks ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- This project aims to standardize the representation and management of EOL and EOS product information across the industry.☆30Mar 4, 2024Updated 2 years ago
- Vulnogram is the tool for reserving, managing, and publishing CVEs. Get started at vulnogram.org or deploy Docker edition for full enterp…☆220Apr 27, 2026Updated last week
- Threat Modeling Manifesto☆31Jul 18, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Documentation and guidance to practice secure coding for various PLC vendors☆42Oct 27, 2023Updated 2 years ago
- Kaze's openly available CVE vulnerability data.☆16Apr 7, 2025Updated last year
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated d…☆290Updated this week
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆15Nov 7, 2021Updated 4 years ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- CISA's catalog of bad practices that are exceptionally risky.☆209Apr 27, 2026Updated last week