ptdropper / CVE-Scanner-for-your-SW-BOMLinks
CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.
☆17Updated 4 years ago
Alternatives and similar repositories for CVE-Scanner-for-your-SW-BOM
Users that are interested in CVE-Scanner-for-your-SW-BOM are comparing it to the libraries listed below
Sorting:
- Unofficial api for cve.mitre.org☆40Updated 3 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Vulnerability Management tool using the CVE-Search database☆10Updated 9 years ago
- A framework for automating penetration testing using a plugin based architecture☆38Updated 3 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- A curated threat modeling library collection☆22Updated last year
- ZAP Management Scripts☆23Updated last week
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 8 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Updated 4 years ago
- DefectDojo Community Content☆18Updated 7 months ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Updated 7 years ago
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayBackend pro…☆16Updated 8 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 3 months ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆26Updated 5 months ago
- Application Security Workflow Automation using Docker and Kubernetes☆22Updated 2 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- Tools for auditing WAFS☆19Updated 3 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆14Updated 7 years ago
- Docker container for running OWASP WebGoat.NET application☆11Updated 7 years ago
- alertflex controller☆10Updated 2 months ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- Search the ExploitDB with a little more control☆21Updated 8 years ago
- introduction to distributed scanning using vultr☆11Updated 8 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- Open Security Summit 2018☆29Updated 4 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Updated 4 years ago