A repo to conduct vulnerability enrichment.
☆773May 19, 2026Updated this week
Alternatives and similar repositories for vulnrichment
Users that are interested in vulnrichment are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CISA CSAF Security Advisories☆105May 12, 2026Updated last week
- Stakeholder-Specific Vulnerability Categorization☆181May 11, 2026Updated last week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆224Updated this week
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆22Apr 17, 2026Updated last month
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆699Jan 6, 2026Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆85May 3, 2024Updated 2 years ago
- Mirror of cisa.gov/kev data files☆88Updated this week
- 脆弱性トリアージガイドライン作成の手引き☆30Jan 10, 2025Updated last year
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆104May 8, 2026Updated last week
- CVE.ICU code.☆53Updated this week
- CVE cache of the official CVE List in CVE JSON 5 format☆2,675Updated this week
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆26May 9, 2026Updated last week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆517Updated this week
- This repository is used for the development of the CVE JSON record format. Releases of the CVE JSON record format will also be published …☆408Jan 30, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆220May 13, 2026Updated last week
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆26May 11, 2026Updated last week
- CLI tool to validate CVE v5 JSON records.☆13May 4, 2026Updated 2 weeks ago
- OpenVEX Specification☆179Jan 16, 2026Updated 4 months ago
- Global Security Database☆319Apr 29, 2024Updated 2 years ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,498May 11, 2026Updated last week
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆507May 12, 2026Updated last week
- ☆11Apr 22, 2026Updated 3 weeks ago
- Vulnogram is the tool for reserving, managing, and publishing CVEs. Get started at vulnogram.org or deploy Docker edition for full enterp…☆225May 6, 2026Updated last week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- CVSS v4.0 calculator☆54May 21, 2025Updated 11 months ago
- Hourly updated database of exploit and exploitation reports☆260Jan 23, 2025Updated last year
- A Python library and command line interface for CVE Services.☆69Jan 30, 2026Updated 3 months ago
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆610Feb 10, 2026Updated 3 months ago
- NVD API 2.0 client for CVE information☆14May 15, 2025Updated last year
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,426Updated this week
- PURL to CPE Relationship mapping project.☆117Updated this week
- Vulnerability Intelligence Platform☆2,689May 11, 2026Updated last week
- ☆18Updated this week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- OASIS CSAF TC: Supporting version control for Work Product artifacts developed by members of TC, including prose specifications and secon…☆217Updated this week
- A standard API specification for exchanging supply chain artifacts and intelligence☆107Mar 25, 2026Updated last month
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆608Mar 12, 2026Updated 2 months ago
- Automatically assess and score software repositories for supply chain risk.☆124Updated this week
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆31Dec 1, 2023Updated 2 years ago
- CVE Automation Working Group☆185May 13, 2026Updated last week
- Global Security Database Project☆28Mar 4, 2023Updated 3 years ago