KEV EPSS Data
☆33Apr 18, 2026Updated this week
Alternatives and similar repositories for KEV_EPSS
Users that are interested in KEV_EPSS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ⚖Open Source Toolkit for Conducting Quantitative Risk Assessment Interviews☆39Mar 10, 2024Updated 2 years ago
- CVE.ICU code.☆51Apr 12, 2026Updated last week
- Factor Analysis of Information Risk (FAIR) model written in Python. Managed and maintained by Hive Systems☆107Jan 10, 2026Updated 3 months ago
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆18Sep 1, 2024Updated last year
- Exploit & Vulnerability Intelligence Repository☆24Jan 20, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆66Apr 9, 2026Updated last week
- The VulnCheck Github Action☆14Apr 2, 2026Updated 2 weeks ago
- Code and Website For PatchThis.app☆32Updated this week
- The difference between exploitation prediction and detection is akin to the difference between detecting a missile launch or a detonation…☆13Apr 11, 2026Updated last week
- This repo hosts links to blogs, documentation and assets referenced by the Security Guide Blog.☆12Apr 1, 2026Updated 2 weeks ago
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆19Jun 24, 2024Updated last year
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆84May 3, 2024Updated last year
- ☆11Dec 9, 2025Updated 4 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Hack23 Public Information Security Management System:Security Through Transparency and Open Documentation Demonstrating Security Excellen…☆36Apr 10, 2026Updated last week
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Sep 27, 2023Updated 2 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- 🎓Materials for the Hands-On Introduction to OpenFAIR Risk Analysis with Tidyrisk☆14Jan 22, 2021Updated 5 years ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆26Mar 9, 2026Updated last month
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆38Updated this week
- Automatically perform exploratory data analysis, and generate a report in Word '.docx' format.☆10Feb 11, 2026Updated 2 months ago
- Unofficial. Splunk MCP server. Implemented in Python and TypeScript/JS. Runs searches, queries Splunk, and outputs data as JSON, CSV, or …☆30Jun 16, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ETW forensic tool for Volatility3 plugin☆17Nov 15, 2024Updated last year
- ☆14Jan 2, 2024Updated 2 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- The CoSAI Risk Map is a framework for identifying, analyzing, and mitigating security risks in Artificial Intelligence systems. As tradit…☆70Apr 10, 2026Updated last week
- [EMNLP 2025 Findings] Familiarity-aware Evidence Compression for Retrieval Augmented Generation☆15Aug 20, 2025Updated 7 months ago
- An SMB library in Go☆13Oct 27, 2022Updated 3 years ago
- A Python-based client for the Cisco openVuln API☆38Nov 9, 2025Updated 5 months ago
- Stakeholder-Specific Vulnerability Categorization☆177Apr 6, 2026Updated last week
- Modron - Cloud security compliance☆34Dec 11, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Pentest report writing guide☆19Sep 24, 2023Updated 2 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Personal Scoop bucket☆12Updated this week
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- Auth.log parser☆48Apr 25, 2018Updated 7 years ago
- Vulnerability Management with SBOM☆20Apr 10, 2026Updated last week
- ☆23Jan 29, 2026Updated 2 months ago