pandatix / go-cvssLinks
Common Vulnerability Scoring System (CVSS) made safe and highly efficient
β47Updated this week
Alternatives and similar repositories for go-cvss
Users that are interested in go-cvss are comparing it to the libraries listed below
Sorting:
- Unofficial but convenient Go wrapper around the NVD REST JSON APIβ35Updated last week
- A Server Side Request Forgery (SSRF) protection library. Made with π€ by Doyensec LLC.β107Updated 3 months ago
- A Go implementation and parser for Sigma rules.β92Updated 4 months ago
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko geneβ¦β104Updated last year
- Adversary emulation for EDR/SIEM testing (macOS/Linux)β50Updated last week
- AttachΓ© provides an emulation layer for Cloud Provider IMDS APIsβ60Updated last year
- β114Updated last month
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this β¦β118Updated this week
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"β67Updated last year
- β56Updated last week
- β180Updated 5 months ago
- The security workflow engine!β119Updated this week
- β89Updated 3 months ago
- Golang-based SDK to CrowdStrike's APIsβ73Updated 2 weeks ago
- β121Updated 4 months ago
- Automated testing, generation & manipulation of #osquery packsβ73Updated 11 months ago
- OSV-SCALIBR: A library for Software Composition Analysisβ502Updated this week
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflowsβ111Updated last month
- A Go-based Exploit Frameworkβ360Updated this week
- β84Updated 2 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,β¦β137Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).β85Updated last year
- Red team tool that emulates the SolarWinds CI compromise attack vector.β24Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently β¦β303Updated last month
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.β334Updated 4 months ago
- β73Updated last week
- A tool for preventing the installation of malicious npm and PyPI packagesβ162Updated this week
- HASH (HTTP Agnostic Software Honeypot)β138Updated last year
- enpoint detection / live analysis & sandbox host / signatures quality testβ44Updated 4 years ago
- K8s API Honeypot with Active Defense Capabilitiesβ42Updated last year