kannkyo / nvd-api
NVD API 2.0 for python
☆12Updated 6 months ago
Alternatives and similar repositories for nvd-api:
Users that are interested in nvd-api are comparing it to the libraries listed below
- Bugs Framework☆7Updated this week
- Development of the NIST vulnerability data ontology (Vulntology).☆37Updated 10 months ago
- OWASP Foundation Web Respository☆27Updated last month
- A place to systematically store software bill of materials (SBOM) documents.☆44Updated last year
- ☆19Updated 4 years ago
- A curated threat modeling library collection☆22Updated last year
- CveXplore☆36Updated last week
- ☆15Updated 3 years ago
- OWASP Foundation Web Respository☆30Updated 2 years ago
- ☆18Updated 3 years ago
- ☆14Updated 2 years ago
- CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.☆17Updated 4 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Updated last year
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆11Updated 5 months ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- Static Token And Credential Scanner☆96Updated last year
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 10 months ago
- ☆15Updated 3 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- ZAP scripts to implement ASVS L1 checking☆15Updated 2 years ago
- A standard API specification for exchanging supply chain artifacts and intelligence☆74Updated 2 weeks ago
- OWASP Foundation Web Respository☆28Updated 7 months ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated 11 months ago
- Maturity Model Collaborative project☆14Updated 2 years ago
- Exploit, Malware and Vulnerability Scoring Application☆11Updated last year
- Examples and proof-of-concept for Software Bill of Materials (SBOM) code & data☆57Updated 11 months ago
- InfoSec OpenAI Examples☆19Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 8 months ago
- OWASP Threat Dragon core files☆11Updated 7 months ago