Enriching the NVD CVSS scores to include Temporal & Threat Metrics
☆224Apr 29, 2026Updated this week
Alternatives and similar repositories for cvss-bt
Users that are interested in cvss-bt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆84May 3, 2024Updated 2 years ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆698Jan 6, 2026Updated 3 months ago
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆22Apr 17, 2026Updated 2 weeks ago
- A repo to conduct vulnerability enrichment.☆759Updated this week
- Stakeholder-Specific Vulnerability Categorization☆180Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Kaze's openly available CVE vulnerability data.☆16Apr 7, 2025Updated last year
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14Updated this week
- MultiStep MCP That Returns CVE Information With EPSS Score☆13May 22, 2025Updated 11 months ago
- Open source templates you can use to bootstrap your security programs☆901Dec 28, 2025Updated 4 months ago
- Repository for the work of the CoSAI Technical Steering Committee (TSC)☆21Apr 24, 2026Updated last week
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆89Aug 13, 2025Updated 8 months ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆736Apr 24, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Repository for CoSAI Workstream 1, Software Supply Chain Security for AI Systems☆48Mar 11, 2026Updated last month
- ☆20Jul 16, 2025Updated 9 months ago
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆129Apr 1, 2026Updated last month
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Apr 23, 2026Updated last week
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆177Mar 1, 2026Updated 2 months ago
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆47Oct 1, 2025Updated 7 months ago
- Source for official CVE Program policy documents.☆18Jan 28, 2026Updated 3 months ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- An index of publicly available and open-source threat detection rulesets.☆133Apr 17, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆52Apr 5, 2026Updated 3 weeks ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆94Updated this week
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated 2 months ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 7 months ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated 2 months ago
- ☆20Apr 10, 2025Updated last year
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆510Updated this week
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆383Apr 15, 2026Updated 2 weeks ago
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆37Apr 17, 2026Updated 2 weeks ago
- Automated web vulnerability scanning with LLM agents☆463Jun 18, 2025Updated 10 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆337Apr 8, 2026Updated 3 weeks ago
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆62Apr 3, 2026Updated last month
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated 3 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆43Apr 3, 2026Updated last month