Mirror of cisa.gov/kev data files
☆85Apr 28, 2026Updated this week
Alternatives and similar repositories for kev-data
Users that are interested in kev-data are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jan 8, 2026Updated 3 months ago
- Code and Website For PatchThis.app☆32Updated this week
- The VulnCheck Github Action☆14Apr 2, 2026Updated last month
- A repo to conduct vulnerability enrichment.☆759Apr 28, 2026Updated last week
- ☆30Jan 13, 2026Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆18Apr 24, 2026Updated last week
- ☆18Updated this week
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated 3 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- A Python port of the R implementation of Kleinberg's burst detection algorithm☆12Apr 11, 2022Updated 4 years ago
- ☆18Feb 2, 2026Updated 3 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆84May 3, 2024Updated 2 years ago
- The difference between exploitation prediction and detection is akin to the difference between detecting a missile launch or a detonation…☆13Apr 25, 2026Updated last week
- Linux upstream vulnerabilities data suitable for dep-scan☆21Updated this week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- This repository contains information related to the Root Cause Mapping Working Group and its activities. CVE Numbering Authority (CNA) re…☆17Jan 29, 2025Updated last year
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Specification for OmniBOR, reproducible identifiers & fine-grained build dependency tracking for software artifacts.☆26Nov 17, 2025Updated 5 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 3 years ago
- A simpler tool for installing dependencies☆24Aug 19, 2024Updated last year
- Kerberoast Detection Script☆30Oct 31, 2024Updated last year
- A common database library for managing and querying security data☆18Jan 12, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Format agnostic SBOM tooling☆137Nov 20, 2025Updated 5 months ago
- ☆53Feb 21, 2025Updated last year
- Analyzes software dependencies across GitHub repositories to identify security vulnerabilities and health risks in your supply chain.☆124Mar 25, 2026Updated last month
- Resources for running in person and virtual workshops.☆15Nov 18, 2025Updated 5 months ago
- The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.☆13Mar 17, 2024Updated 2 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- ☆15Apr 6, 2025Updated last year
- Parsec-like parser combinators for Crystal☆17Nov 17, 2022Updated 3 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆26Apr 27, 2026Updated last week
- The `classic` snap☆16Oct 19, 2018Updated 7 years ago
- A tool to update Nudge configuration definitions automatically.☆17Aug 20, 2025Updated 8 months ago
- Matrix Client for Linux, written in Dart & Flutter☆19Updated this week
- Your Everyday Threat Intelligence☆22Mar 21, 2017Updated 9 years ago
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆16Feb 1, 2021Updated 5 years ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year