jgamblin / monthlyCVEStats
Monthly CVE Stats
☆37Updated 2 weeks ago
Alternatives and similar repositories for monthlyCVEStats:
Users that are interested in monthlyCVEStats are comparing it to the libraries listed below
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 7 months ago
- CVE.ICU code.☆39Updated this week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆67Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆71Updated 9 months ago
- Analysis of the Enterprise SAST/DAST product landscape☆36Updated 11 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆130Updated last year
- Code and Website For PatchThis.app☆29Updated this week
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- boostsecurityio/lotp☆112Updated this week
- ☆38Updated 10 months ago
- OWASP Foundation Web Respository☆28Updated 2 years ago
- ☆47Updated this week
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 5 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 2 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆132Updated last year
- Do bulk whois lookups and get alerted on domains of interest.☆24Updated 6 months ago
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆18Updated 7 months ago
- InfoSec OpenAI Examples☆19Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 7 months ago
- ☆109Updated last year
- Tool for obfuscating and deobfuscating data.☆67Updated 11 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆49Updated last year
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆61Updated last week
- Manager of third-party sources of Semgrep rules 🗂☆78Updated 7 months ago
- Global Security Database Tools☆42Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆53Updated last week
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆90Updated last week
- HASH (HTTP Agnostic Software Honeypot)☆136Updated 9 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆45Updated 6 months ago