Mirror of cisa.gov/kev data files
☆71Feb 26, 2026Updated last week
Alternatives and similar repositories for kev-data
Users that are interested in kev-data are comparing it to the libraries listed below
Sorting:
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated last month
- The VulnCheck Github Action☆13Feb 25, 2026Updated last week
- ☆16Updated this week
- Code and Website For PatchThis.app☆32Updated this week
- A repo to conduct vulnerability enrichment.☆738Updated this week
- ☆30Jan 13, 2026Updated last month
- ☆18Feb 2, 2026Updated last month
- Detection scripts for MDM deployment to identify OpenClaw installations on managed devices.☆69Feb 5, 2026Updated last month
- Format agnostic SBOM tooling☆133Nov 20, 2025Updated 3 months ago
- Advanced Shodan-based scanner for discovering, verifying, and enumerating Model Context Protocol (MCP) servers and AI infrastructure tool…☆37Jan 3, 2026Updated 2 months ago
- Analyzes software dependencies across GitHub repositories to identify security vulnerabilities and health risks in your supply chain.☆120Dec 9, 2025Updated 2 months ago
- Powershell script for Windows to retrieve the authentication hardening status of DCOM applications☆23Jan 15, 2023Updated 3 years ago
- A collection of exercises for practicing what is taught in Genki: An Integrated Course in Elementary Japanese.☆23Sep 12, 2025Updated 5 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Your Everyday Threat Intelligence☆22Mar 21, 2017Updated 8 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- A simpler tool for installing dependencies☆24Aug 19, 2024Updated last year
- App that simplifies building decision trees to model adverse scenarios☆228Jul 11, 2024Updated last year
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Jan 4, 2026Updated 2 months ago
- A security checking tool☆106Feb 4, 2026Updated last month
- Resources for running in person and virtual workshops.☆15Nov 18, 2025Updated 3 months ago
- Crane POAM Automation Tool (C-PAT™)☆15Updated this week
- ☆36Apr 29, 2025Updated 10 months ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆31Jul 27, 2023Updated 2 years ago
- 💅🏽 analyzes your github actions☆98Feb 9, 2026Updated 3 weeks ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83May 3, 2024Updated last year
- PowerShell module to manage the Entra ID device-bound passkey feature☆33Jun 5, 2024Updated last year
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 3 months ago
- Kerberoast Detection Script☆30Oct 31, 2024Updated last year
- A comprehensive framework for analyzing and defending against attacks targeting Software Development Life Cycle Infrastructure.☆128Updated this week
- OpenVEX Specification☆168Jan 16, 2026Updated last month
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆215Updated this week
- Darkfiles finds orphaned files in container images and makes them to bad deeds☆42May 11, 2023Updated 2 years ago
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- Fairwinds Base Image Finder CLI☆39Feb 16, 2026Updated 2 weeks ago
- Venture: Cross-Platform GUI tool for parsing and analyzing Windows event logs☆92Jan 23, 2025Updated last year
- ☆17Feb 3, 2026Updated last month