cve-search / cpe-guesserLinks
Tool to guess CPE name based on common software name
☆104Updated this week
Alternatives and similar repositories for cpe-guesser
Users that are interested in cpe-guesser are comparing it to the libraries listed below
Sorting:
- Global Security Database Tools☆44Updated last year
- CVE.ICU code.☆46Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- Extensible framework for analyzing publicly available information about vulnerabilities☆117Updated 4 months ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 2 months ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- Website for ail-typo-squatting library☆65Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆80Updated 2 weeks ago
- Stakeholder-Specific Vulnerability Categorization☆163Updated this week
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆77Updated last week
- Vulnogram is a tool for creating and editing CVE information in CVE JSON format☆199Updated 4 months ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆129Updated last month
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆365Updated this week
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆60Updated 2 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆57Updated 5 months ago
- CveXplore☆43Updated this week
- ☆47Updated this week
- Docker Image for CVE-Search☆115Updated 6 months ago
- Signature based honeypot detector tool written in Golang☆103Updated 5 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆99Updated 2 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Adversary Emulation Planner☆41Updated last year
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆42Updated 3 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆137Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆31Updated 3 weeks ago
- A project to visualize the software supply chain☆53Updated 2 years ago
- Tools used by CSIRT and especially in the scope of CNW☆17Updated 2 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆35Updated 9 months ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆79Updated 2 months ago