IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to search for CVEs related to a software product.
☆68Mar 18, 2021Updated 5 years ago
Alternatives and similar repositories for iva
Users that are interested in iva are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Library to convert a information text (server banner, for example) into CPE v2.3 value☆24Jan 10, 2014Updated 12 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- Oauth authentication for Imap receivers of GLPI☆16Mar 16, 2026Updated last week
- ☆12Nov 6, 2017Updated 8 years ago
- Architecture - design and implementation of the D4 project architecture☆16Jul 3, 2025Updated 8 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This plugin is an interface between GLPI and MDT (Microsoft Deployment Toolbox)☆15Feb 13, 2022Updated 4 years ago
- ☆11Mar 19, 2019Updated 7 years ago
- ☆14Sep 29, 2015Updated 10 years ago
- cve-search - a tool to perform local searches for known vulnerabilities☆2,606Mar 18, 2026Updated last week
- Secure your server, protect your web apps, load your sites faster, avoid malware, block malicious code, be Happy☆22Aug 28, 2015Updated 10 years ago
- Gantt view for GLPI☆21Mar 2, 2026Updated 3 weeks ago
- deadsimple BSD Security Advisories and Announcements☆19Updated this week
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Sep 7, 2021Updated 4 years ago
- Automatic bridge creation and packet capture (plug-and-capture) on a battery-powered Raspberry Pi with multiple network interfaces.☆21May 13, 2014Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A simple python library to assist in working with cpes☆19Jan 30, 2024Updated 2 years ago
- Import Mitre Att&ck into Neo4j database☆39Mar 5, 2026Updated 3 weeks ago
- Build a local copy of CPE(Common Platform Enumeration)☆106Mar 9, 2026Updated 2 weeks ago
- A utility for validating and parsing Common Platform Enumeration (CPE) v2.2 and v2.3 as originally defined by MITRE and maintained by NIS…☆54Jan 26, 2026Updated 2 months ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- Tool to guess CPE name based on common software name☆120Mar 22, 2026Updated last week
- ☆33Aug 14, 2025Updated 7 months ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 9 months ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Mar 12, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Windows memory instrumentation tool to track memory allocations and deallocations for long-running applications.☆14Jul 22, 2020Updated 5 years ago
- Python wrapper for the API of cve-search☆127Dec 5, 2023Updated 2 years ago
- Structured Information on State and Evolution of Dockerfiles - Online Appendix☆10Mar 16, 2018Updated 8 years ago
- STIG-CCI-CONTROLMAPPER☆17Jun 21, 2018Updated 7 years ago
- The .ACTR project is a 3D presentation standard for avatars. It is a method of generating real-time avatar animation from natural languag…☆13Sep 10, 2018Updated 7 years ago
- Sharpen your data science and cybersecurity skills by doing a project with open datasets☆10Jun 9, 2020Updated 5 years ago
- ☆11Nov 18, 2024Updated last year
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- OVAL Interpreter☆14Sep 14, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Search NVD locally☆14Jun 4, 2025Updated 9 months ago
- Fuzzing with controlled compilation☆31Apr 7, 2023Updated 2 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- AtroPM is a simple, but powerful, configurable, open-source Project Management Software, inspired by Github and Gitlab.☆16Jan 26, 2024Updated 2 years ago
- Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS☆26Dec 7, 2023Updated 2 years ago
- A set of tools to work with the feeds (vulnerabilities, CPE dictionary etc.) distributed by National Vulnerability Database (NVD)☆470Jan 2, 2024Updated 2 years ago