CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.
☆17Oct 26, 2020Updated 5 years ago
Alternatives and similar repositories for CVE-Scanner-for-your-SW-BOM
Users that are interested in CVE-Scanner-for-your-SW-BOM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Create CycloneDX Software Bill of Materials (SBOM) for Buildroot projects☆15Apr 17, 2026Updated 2 weeks ago
- A multi scanner for docker images. It drives Clair, Anchore, Trivy, Snyk, Grype, AWS ECR scans and consolidates the results.☆14Jun 23, 2023Updated 2 years ago
- Automated Penetration Testing Framework☆35Mar 22, 2019Updated 7 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Dec 5, 2018Updated 7 years ago
- ☆11May 12, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Sep 18, 2020Updated 5 years ago
- Modular framework for file information extraction and dependency analysis to generate accurate SBOMs☆40Apr 27, 2026Updated last week
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- 各种安全相关思维导图整理收集☆12Feb 13, 2017Updated 9 years ago
- An applescript to use ghostty as terminal in alfred.☆12Apr 10, 2026Updated 3 weeks ago
- Python API library for DefectDojo☆43Feb 24, 2023Updated 3 years ago
- The official Jenkins docker plus some plugins and scripts for integrating with the Gerrit.☆11Jun 21, 2019Updated 6 years ago
- ☆11Feb 15, 2022Updated 4 years ago
- Shim to easily install OWASP dependency-check-cli into Python projects☆50Apr 13, 2026Updated 3 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- gamedll☆10May 11, 2017Updated 8 years ago
- 基于zoomeye的思路制作的小型空间引擎及攻击模型☆16Jun 4, 2017Updated 8 years ago
- Set of tools to provide automation of tasks for creating STIG-partitioned EL8 AMIs☆10Apr 20, 2026Updated 2 weeks ago
- ☆15Jul 12, 2020Updated 5 years ago
- 关闭恶意驱动的文件和注册表保护☆14Jun 28, 2022Updated 3 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- A demo project to demonstrate Crossplane use in GitOps☆16Nov 2, 2021Updated 4 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 记录一下Windows下的Hook技巧☆15Jul 15, 2024Updated last year
- PoC for a Keycloak Dockerimage with service discovery via KUBE_PING☆12Dec 11, 2018Updated 7 years ago
- Configurations for a vertical 72" PiWall system☆13Jan 21, 2017Updated 9 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- ☆14Sep 30, 2022Updated 3 years ago
- Consul ACL Terraform Provider☆17Jan 18, 2021Updated 5 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆16Nov 29, 2023Updated 2 years ago
- Samples of Avatar firmware analysis (including NDSS'14 cases)☆20Jun 27, 2017Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Jan 29, 2026Updated 3 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A tool for managing software RAID under Linux☆16Apr 23, 2014Updated 12 years ago
- Extract LZMA sections from cable modem firmware images☆20Nov 18, 2013Updated 12 years ago
- Packet Injection With WFP☆16Apr 2, 2026Updated last month
- Mac defaults: macOS system setup configuration script via default write☆22Apr 14, 2025Updated last year
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Apr 15, 2020Updated 6 years ago
- tmux/tmate Usage in A4☆21Jul 4, 2020Updated 5 years ago