CISA CSAF Security Advisories
☆99Mar 17, 2026Updated last week
Alternatives and similar repositories for CSAF
Users that are interested in CSAF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- A repo to conduct vulnerability enrichment.☆742Mar 18, 2026Updated last week
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆32Sep 4, 2024Updated last year
- OASIS TC Open Repository: A GitHub repository for management of non-normative information about the work of the CSAF Technical Committee,…☆21Mar 13, 2026Updated last week
- Secvisogram is a web tool for creating and editing security advisories in the CSAF 2.0 format☆41Updated this week
- OASIS OpenEoX TC: The purpose of this repository is to support version control for Work Product artifacts developed by members of the OAS…☆49Mar 5, 2026Updated 2 weeks ago
- CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and …☆75Nov 20, 2024Updated last year
- Stakeholder-Specific Vulnerability Categorization☆176Updated this week
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- ☆11Jan 28, 2025Updated last year
- ☆75Apr 3, 2025Updated 11 months ago
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆19Jun 24, 2024Updated last year
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago
- Secvisogram is a web tool for creating and editing security advisories in the CSAF 2.0 format☆30Mar 14, 2026Updated last week
- Tools to download or provide CSAF (Common Security Advisory Framework) documents.☆58Dec 18, 2025Updated 3 months ago
- Open-source CMDB for ICS and OT environments — map assets, visualize networks, track changes, and keep control.☆51Updated this week
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated last month
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆35Feb 9, 2025Updated last year
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆93Jun 19, 2024Updated last year
- Build, edit, validate, and export CycloneDX BOMs through an intuitive browser-based interface☆16Mar 13, 2026Updated last week
- Utility that converts SBOM documents from CycloneDX to SPDX☆33Jan 19, 2024Updated 2 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Sep 7, 2021Updated 4 years ago
- ☆11Jan 7, 2022Updated 4 years ago
- Rulezet is an open-source web platform for sharing, evaluating, improving, and managing cybersecurity detection rules (YARA, Sigma, Suric…☆42Updated this week
- Labeled vulnerability-package match pairs used as ground truth to evaluate vulnerability scanners☆14Mar 17, 2026Updated last week
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆92Updated this week
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 7 months ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Multi-threading Leaks/Intelligence file parser☆15Mar 16, 2026Updated last week
- This project aims to standardize the representation and management of EOL and EOS product information across the industry.☆30Mar 4, 2024Updated 2 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Vulnogram is the tool for reserving, managing, and publishing CVEs. Get started at vulnogram.org or deploy Docker edition for full enterp…☆216Mar 17, 2026Updated last week
- Threat Modeling Manifesto☆30Jul 18, 2024Updated last year
- Documentation and guidance to practice secure coding for various PLC vendors☆42Oct 27, 2023Updated 2 years ago
- Kaze's openly available CVE vulnerability data.☆16Apr 7, 2025Updated 11 months ago
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆15Nov 7, 2021Updated 4 years ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- CISA's catalog of bad practices that are exceptionally risky.☆208Feb 25, 2026Updated 3 weeks ago
- OWASP Foundation Web Respository☆32Oct 11, 2025Updated 5 months ago