A utility for validating and parsing Common Platform Enumeration (CPE) v2.2 and v2.3 as originally defined by MITRE and maintained by NIST
☆54Jan 26, 2026Updated 2 months ago
Alternatives and similar repositories for CPE-Parser
Users that are interested in CPE-Parser are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 9 months ago
- The NIST Open Access to Research (OAR) Public Data Repository (PDR) system software☆14Jan 4, 2026Updated 3 months ago
- A cli that can be used to query various online vulnerability sources such as the NVD or GHSA. The CLI and docker images can be used to mi…☆165Apr 6, 2026Updated last week
- Vulnerability Management with SBOM☆20Apr 10, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- CPE: Common Platform Enumeration for Python☆96Sep 23, 2025Updated 6 months ago
- A place to systematically store software bill of materials (SBOM) documents.☆50Jun 1, 2023Updated 2 years ago
- Repository of SBOMs generated by the syft SBOM generator tool, against a list of popular dockerhub container images.☆19Mar 3, 2026Updated last month
- fatbom (Fat Bill Of Materials) is a tool which combines the SBOM generated by various tools into one fat SBOM. Thus leveraging each tool'…☆33Oct 24, 2022Updated 3 years ago
- Externalize Java application access to protected resources as log messages.☆44Apr 2, 2026Updated 2 weeks ago
- 脆弱性トリアージガイドライン作成の手引き☆30Jan 10, 2025Updated last year
- Actionable data for Security Operations☆19Aug 26, 2021Updated 4 years ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆68Mar 18, 2021Updated 5 years ago
- Collaborative, web-based case management for incident response☆24Jan 23, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A ComplianceAsCode blog☆31Apr 8, 2026Updated last week
- A minimal specification for purl aka. a package "mostly universal" URL, join the discussion at https://gitter.im/package-url/Lobby☆1,007Apr 8, 2026Updated last week
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- STIG-CCI-CONTROLMAPPER☆17Jun 21, 2018Updated 7 years ago
- A simple Java command-line utility to mirror the CVE JSON data from NIST.☆214Nov 4, 2022Updated 3 years ago
- ☆11Nov 18, 2024Updated last year
- Search NVD locally☆14Jun 4, 2025Updated 10 months ago
- Helm Chart for deploying GUAC☆18Mar 9, 2026Updated last month
- Fedora Cyber Test Lab offers quantitative static and dynamic risk analysis of binaries☆13Feb 11, 2018Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Vulnmine searches for vulnerable hosts using MS SCCM host / software inventory data with NIST NVD Vulnerability feed data.☆38Jul 6, 2023Updated 2 years ago
- Secvisogram is a web tool for creating and editing security advisories in the CSAF 2.0 format☆42Apr 8, 2026Updated last week
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆22May 4, 2023Updated 2 years ago
- NestJs module to easily implement event driven architecture using RxJs in any NestJs project☆10Apr 1, 2022Updated 4 years ago
- Trillium's - Master the art Of Necessary cybersecurity skills (T-MON)☆14Mar 27, 2024Updated 2 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- OASIS TC Open Repository: CSAF Parser tool for parsing and checking the syntax of the Common Vulnerability Reporting Framework (CVRF) con…☆24Jul 14, 2022Updated 3 years ago
- Report missing advisories and corrections on OSS Index☆17Jan 19, 2023Updated 3 years ago
- Network and USB protocol fuzzing toolkit.☆34Jul 27, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Stakeholder-Specific Vulnerability Categorization☆177Apr 6, 2026Updated last week
- A very fast network scanner of SSL server configurations☆11Mar 28, 2016Updated 10 years ago
- rpm2cpe translates package names to CPE values.☆11Oct 25, 2017Updated 8 years ago
- Go implementation of the package url spec☆73Mar 7, 2026Updated last month
- Prepends project files with given template.☆18Mar 4, 2025Updated last year
- Tabulate is a command-line tool to convert record type data (e.g. CSV files) into a pretty printed table.☆16Mar 1, 2020Updated 6 years ago
- Phosphor: Dynamic Taint Tracking for the JVM☆180Jun 17, 2025Updated 9 months ago