A repo to conduct vulnerability enrichment.
☆750Apr 8, 2026Updated this week
Alternatives and similar repositories for vulnrichment
Users that are interested in vulnrichment are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CISA CSAF Security Advisories☆101Updated this week
- Stakeholder-Specific Vulnerability Categorization☆177Updated this week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆221Apr 1, 2026Updated last week
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆23Mar 27, 2026Updated last week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆696Jan 6, 2026Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆84May 3, 2024Updated last year
- Mirror of cisa.gov/kev data files☆76Updated this week
- 脆弱性トリアージガイドライン作成の手引き☆30Jan 10, 2025Updated last year
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆102Mar 6, 2026Updated last month
- CVE cache of the official CVE List in CVE JSON 5 format☆2,574Updated this week
- CVE.ICU code.☆51Updated this week
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆24Updated this week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆494Updated this week
- This repository is used for the development of the CVE JSON record format. Releases of the CVE JSON record format will also be published …☆403Jan 30, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆214Apr 1, 2026Updated last week
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆25Mar 9, 2026Updated last month
- CLI tool to validate CVE v5 JSON records.☆13May 14, 2025Updated 10 months ago
- OpenVEX Specification☆172Jan 16, 2026Updated 2 months ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆486Updated this week
- Global Security Database☆318Apr 29, 2024Updated last year
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,406Updated this week
- ☆10Updated this week
- Vulnogram is the tool for reserving, managing, and publishing CVEs. Get started at vulnogram.org or deploy Docker edition for full enterp…☆218Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CVSS v4.0 calculator☆54May 21, 2025Updated 10 months ago
- Hourly updated database of exploit and exploitation reports☆261Jan 23, 2025Updated last year
- A Python library and command line interface for CVE Services.☆70Jan 30, 2026Updated 2 months ago
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆608Feb 10, 2026Updated last month
- NVD API 2.0 client for CVE information☆13May 15, 2025Updated 10 months ago
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,404Updated this week
- Vulnerability Intelligence Platform☆2,640Mar 30, 2026Updated last week
- PURL to CPE Relationship mapping project.☆113Updated this week
- OASIS CSAF TC: Supporting version control for Work Product artifacts developed by members of TC, including prose specifications and secon…☆213Mar 16, 2026Updated 3 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A standard API specification for exchanging supply chain artifacts and intelligence☆106Mar 25, 2026Updated 2 weeks ago
- Automatically assess and score software repositories for supply chain risk.☆122Mar 24, 2026Updated 2 weeks ago
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆608Mar 12, 2026Updated 3 weeks ago
- CVE Automation Working Group☆182Apr 1, 2026Updated last week
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆30Dec 1, 2023Updated 2 years ago
- SBOM Explorer - Discover and pull public SBOMs☆20May 23, 2025Updated 10 months ago
- Global Security Database Project☆28Mar 4, 2023Updated 3 years ago