Build a CVE library with aggregated CISA, EPSS and CVSS data
☆29Sep 27, 2023Updated 2 years ago
Alternatives and similar repositories for CVEAggregate
Users that are interested in CVEAggregate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆33Oct 13, 2022Updated 3 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Jan 4, 2026Updated 3 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 4 months ago
- SPDX Merge tool☆51Mar 2, 2026Updated last month
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆23Mar 27, 2026Updated last week
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.☆40Jun 17, 2025Updated 9 months ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- Android Clean Architecture Framework☆10Nov 28, 2016Updated 9 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆42Dec 12, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆10Aug 11, 2025Updated 7 months ago
- Threat model for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based ap…☆59Mar 20, 2026Updated 2 weeks ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- ☆114Jun 8, 2023Updated 2 years ago
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated last month
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- cheatsheets for life☆13Jan 22, 2026Updated 2 months ago
- ☆58Updated this week
- An android demo which covert camera preview data in NV21 format to I420 by libyuv☆10Oct 6, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆16Feb 10, 2025Updated last year
- OWASP Foundation Web Respository☆11May 22, 2023Updated 2 years ago
- a small script to collect information from a management point☆37Jan 19, 2026Updated 2 months ago
- Static analysis tool to Identify and Fix GitHub Actions prone to Supply‑Chain Risks☆14Dec 24, 2025Updated 3 months ago
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆138Mar 31, 2026Updated last week
- Fixed 2025 version of Mega Dumper with 64 bit and generic PE support. It can solve Enigma Latest (7.90)☆30Dec 27, 2025Updated 3 months ago
- A ruby gem for Rails to fetch, parse, store and search CVE entries provided by the National Vulnerability Database.☆26Apr 15, 2013Updated 12 years ago
- ☆117Feb 11, 2026Updated last month
- netbeacon - monitoring your network capture, NIDS or network analysis process☆20Updated this week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 7 months ago
- Bulk hostname lookup using shodan☆14Jun 1, 2022Updated 3 years ago
- ☆25Oct 14, 2024Updated last year
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- For a number of years now, work has been proceeding in order to bring to perfection the crudely-conceived idea of a machine that would no…☆14Nov 12, 2025Updated 4 months ago
- Contextual Deserialization vulnerability that causes RCE - Remote Code Execution☆14Apr 28, 2024Updated last year
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆81Oct 20, 2023Updated 2 years ago