Mirror of cisa.gov/kev data files
☆73Mar 19, 2026Updated this week
Alternatives and similar repositories for kev-data
Users that are interested in kev-data are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jan 8, 2026Updated 2 months ago
- The VulnCheck Github Action☆14Feb 25, 2026Updated last month
- A repo to conduct vulnerability enrichment.☆745Updated this week
- ☆30Jan 13, 2026Updated 2 months ago
- ☆16Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆17Updated this week
- Ruby ALPC Fuzzer ( joke )☆24Oct 12, 2014Updated 11 years ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated last month
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnerability.☆44Feb 10, 2026Updated last month
- ☆18Feb 2, 2026Updated last month
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83May 3, 2024Updated last year
- A repo for output of an intrusion prediction project☆11Mar 15, 2026Updated last week
- Linux upstream vulnerabilities data suitable for dep-scan☆21Updated this week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Specification for OmniBOR, reproducible identifiers & fine-grained build dependency tracking for software artifacts.☆26Nov 17, 2025Updated 4 months ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Kerberoast Detection Script☆30Oct 31, 2024Updated last year
- Format agnostic SBOM tooling☆135Nov 20, 2025Updated 4 months ago
- ☆51Feb 21, 2025Updated last year
- Analyzes software dependencies across GitHub repositories to identify security vulnerabilities and health risks in your supply chain.☆121Dec 9, 2025Updated 3 months ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Resources for running in person and virtual workshops.☆15Nov 18, 2025Updated 4 months ago
- The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.☆13Mar 17, 2024Updated 2 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- ☆14Apr 6, 2025Updated 11 months ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆25Mar 9, 2026Updated 2 weeks ago
- The `classic` snap☆16Oct 19, 2018Updated 7 years ago
- The ronin-rb.dev website☆24Jan 12, 2026Updated 2 months ago
- Matrix Client for Linux, written in Dart & Flutter☆19Mar 15, 2026Updated last week
- 🔒📈 Host file tools written in rust.☆15Dec 23, 2025Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Your Everyday Threat Intelligence☆22Mar 21, 2017Updated 9 years ago
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆137Mar 10, 2026Updated 2 weeks ago
- Documenting various metrics available for open source projects☆14Jan 4, 2024Updated 2 years ago
- Customized NXLog configuration used to generate data from Windows endpoints that can be leveraged by teams for better insight into host-a…☆17Jul 22, 2021Updated 4 years ago
- Adversary Emulation Planner☆42Jan 9, 2026Updated 2 months ago