Enriching the NVD CVSS scores to include Temporal & Threat Metrics
☆216Feb 27, 2026Updated this week
Alternatives and similar repositories for cvss-bt
Users that are interested in cvss-bt are comparing it to the libraries listed below
Sorting:
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83May 3, 2024Updated last year
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆691Jan 6, 2026Updated last month
- Stakeholder-Specific Vulnerability Categorization☆175Updated this week
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆23Jan 21, 2026Updated last month
- A repo to conduct vulnerability enrichment.☆733Updated this week
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- Kaze's openly available CVE vulnerability data.☆16Apr 7, 2025Updated 10 months ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆719Nov 14, 2025Updated 3 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆125Sep 23, 2025Updated 5 months ago
- Open source templates you can use to bootstrap your security programs☆890Dec 28, 2025Updated 2 months ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated last month
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 7 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Feb 13, 2026Updated 2 weeks ago
- ☆20Jul 16, 2025Updated 7 months ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆85Aug 13, 2025Updated 6 months ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last week
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated 11 months ago
- MultiStep MCP That Returns CVE Information With EPSS Score☆13May 22, 2025Updated 9 months ago
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆91Updated this week
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Feb 13, 2026Updated 2 weeks ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 10 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆289Feb 5, 2024Updated 2 years ago
- KYE: Know Your Enemies - Check external access on your AWS account☆129Apr 25, 2025Updated 10 months ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14Updated this week
- ☆120May 26, 2025Updated 9 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77May 21, 2024Updated last year
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆471Feb 23, 2026Updated last week
- ☆381Apr 18, 2024Updated last year
- Repository for CoSAI Workstream 1, Software Supply Chain Security for AI Systems☆42Sep 29, 2025Updated 5 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆334Jan 12, 2026Updated last month
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆680Updated this week
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 5 months ago
- ☆20Apr 10, 2025Updated 10 months ago