pandatix / go-cvssLinks
Common Vulnerability Scoring System (CVSS) made safe and highly efficient
☆47Updated this week
Alternatives and similar repositories for go-cvss
Users that are interested in go-cvss are comparing it to the libraries listed below
Sorting:
- Unofficial but convenient Go wrapper around the NVD REST JSON API☆35Updated 3 weeks ago
- A Go implementation and parser for Sigma rules.☆93Updated 6 months ago
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆122Updated last month
- A Server Side Request Forgery (SSRF) protection library. Made with 🖤 by Doyensec LLC.☆107Updated 5 months ago
- The security workflow engine!☆133Updated last week
- OSV-SCALIBR: A library for Software Composition Analysis☆529Updated last week
- ☆56Updated this week
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆103Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆312Updated last month
- ☆114Updated 3 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆87Updated last year
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆138Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆113Updated last week
- K8s API Honeypot with Active Defense Capabilities☆42Updated last year
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆174Updated last week
- boostsecurityio/lotp☆137Updated last month
- Tool for collecting vulnerability data from various sources (used to build the grype database)☆105Updated this week
- ☆182Updated 6 months ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- Mirror of cisa.gov/kev data files☆60Updated last week
- ☆44Updated 6 months ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated last year
- ☆85Updated 3 weeks ago
- A Go-based Exploit Framework☆383Updated last week
- A tool to create, transform and attest VEX metadata☆164Updated last week
- Automated testing, generation & manipulation of #osquery packs☆73Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- Kubernetes focused container assessment and context discovery tool for penetration testing☆469Updated 2 weeks ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆74Updated 2 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆335Updated 6 months ago