kannkyo / nvd-api
NVD API 2.0 for python
☆12Updated 4 months ago
Alternatives and similar repositories for nvd-api:
Users that are interested in nvd-api are comparing it to the libraries listed below
- Development of the NIST vulnerability data ontology (Vulntology).☆37Updated 8 months ago
- Bugs Framework☆7Updated 3 weeks ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- A place to systematically store software bill of materials (SBOM) documents.☆44Updated last year
- Static Token And Credential Scanner☆95Updated last year
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆18Updated 7 months ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Updated last year
- CveXplore☆35Updated last week
- ☆16Updated 3 years ago
- ☆32Updated 2 years ago
- A curated threat modeling library collection☆22Updated last year
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 9 months ago
- CVSS v4.0 calculator☆37Updated 3 months ago
- CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.☆17Updated 4 years ago
- Global Security Database Tools☆42Updated last year
- This repository supports the blog site www.cloudauditcontrols.com.☆9Updated last week
- ☆14Updated 3 years ago
- Automated Static Analysis Framework☆9Updated 2 years ago
- OWASP Foundation Web Respository☆27Updated 5 months ago
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 4 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- CVE.ICU code.☆39Updated this week
- Exploit, Malware and Vulnerability Scoring Application☆10Updated last year
- Tools for security content automation, baseline tailoring, and overlay development.☆43Updated 5 months ago
- Official repository for the Open Vulnerability and Assessment Language☆40Updated last week
- CVSS v4.0 calculator☆29Updated 5 months ago
- ☆47Updated this week
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆90Updated this week
- Adversary Emulation Planner☆38Updated 7 months ago