IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to search for CVEs related to a software product.
☆68Mar 18, 2021Updated 4 years ago
Alternatives and similar repositories for iva
Users that are interested in iva are comparing it to the libraries listed below
Sorting:
- Architecture - design and implementation of the D4 project architecture☆16Jul 3, 2025Updated 8 months ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 9 months ago
- Oauth authentication for Imap receivers of GLPI☆14Feb 27, 2026Updated last week
- CPE: Common Platform Enumeration for Python☆97Sep 23, 2025Updated 5 months ago
- ☆11Mar 19, 2019Updated 6 years ago
- The official LibPrelude GitHub mirror of https://www.prelude-siem.org/projects/libprelude/repository☆12Sep 11, 2020Updated 5 years ago
- ☆12Nov 6, 2017Updated 8 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Sep 7, 2021Updated 4 years ago
- Track the downtimes of your websites and your servers with uptime robot. Chart the dates and times of downtimes events, the reason behind…☆12Jan 27, 2019Updated 7 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- This plugin is an interface between GLPI and MDT (Microsoft Deployment Toolbox)☆15Feb 13, 2022Updated 4 years ago
- Created by Denis Podgurskiy via the GitHub Connector☆13May 20, 2021Updated 4 years ago
- deadsimple BSD Security Advisories and Announcements☆19Feb 20, 2026Updated 2 weeks ago
- A Windows memory instrumentation tool to track memory allocations and deallocations for long-running applications.☆14Jul 22, 2020Updated 5 years ago
- The .ACTR project is a 3D presentation standard for avatars. It is a method of generating real-time avatar animation from natural languag…☆13Sep 10, 2018Updated 7 years ago
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- Secvisogram is a web tool for creating and editing security advisories in the CSAF 2.0 format☆41Updated this week
- ☆13Dec 8, 2022Updated 3 years ago
- Secure your server, protect your web apps, load your sites faster, avoid malware, block malicious code, be Happy☆22Aug 28, 2015Updated 10 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- Import Mitre Att&ck into Neo4j database☆39Dec 8, 2022Updated 3 years ago
- Slides and Demos for "Secure Development on Kubernetes" talk☆22Nov 11, 2024Updated last year
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- Méthode de Sensibilisation à la Sécurité Informatique pour un public Néophyte☆17Jun 17, 2015Updated 10 years ago
- OASIS TC Open Repository: Match STIX content against STIX patterns☆46Aug 1, 2022Updated 3 years ago
- A simple python library to assist in working with cpes☆19Jan 30, 2024Updated 2 years ago
- firmware evaluation reference corpus☆23Dec 5, 2022Updated 3 years ago
- Build a local copy of CPE(Common Platform Enumeration)☆105Mar 2, 2026Updated last week
- cve-search - a tool to perform local searches for known vulnerabilities☆2,596Feb 20, 2026Updated 2 weeks ago
- OASIS OpenC2 TC: Repository for submitting and reviewing OpenC2 use cases relevant to the work of the OpenC2 Language Subcommittee (LSC)☆30Apr 20, 2022Updated 3 years ago
- Exploit Prediction Scoring System (EPSS)☆31Jun 1, 2022Updated 3 years ago
- ☆33Aug 14, 2025Updated 6 months ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- A utility for validating and parsing Common Platform Enumeration (CPE) v2.2 and v2.3 as originally defined by MITRE and maintained by NIS…☆55Jan 26, 2026Updated last month
- Tool to guess CPE name based on common software name☆117Feb 11, 2026Updated 3 weeks ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Apr 15, 2024Updated last year
- Leghorn code for PKI abuse☆32Jun 17, 2021Updated 4 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆138Updated this week