Enriching the NVD CVSS scores to include Temporal & Threat Metrics
☆224May 20, 2026Updated this week
Alternatives and similar repositories for cvss-bt
Users that are interested in cvss-bt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆85May 3, 2024Updated 2 years ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆700Jan 6, 2026Updated 4 months ago
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆22Apr 17, 2026Updated last month
- A repo to conduct vulnerability enrichment.☆773Updated this week
- Stakeholder-Specific Vulnerability Categorization☆181May 11, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Kaze's openly available CVE vulnerability data.☆16Apr 7, 2025Updated last year
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆52Nov 16, 2024Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14May 15, 2026Updated last week
- Repository for the work of the CoSAI Technical Steering Committee (TSC)☆23May 15, 2026Updated last week
- MultiStep MCP That Returns CVE Information With EPSS Score☆13May 22, 2025Updated last year
- Open source templates you can use to bootstrap your security programs☆907Dec 28, 2025Updated 4 months ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆90Aug 13, 2025Updated 9 months ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆739May 15, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Repository for CoSAI Workstream 1, Software Supply Chain Security for AI Systems☆51Apr 27, 2026Updated 3 weeks ago
- ☆20Jul 16, 2025Updated 10 months ago
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆129May 12, 2026Updated last week
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆59May 8, 2026Updated 2 weeks ago
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆177Mar 1, 2026Updated 2 months ago
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆47Oct 1, 2025Updated 7 months ago
- Source for official CVE Program policy documents.☆18Jan 28, 2026Updated 3 months ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- An index of publicly available and open-source threat detection rulesets.☆135Apr 17, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆52May 2, 2026Updated 3 weeks ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆96Updated this week
- AWS Trustline: Check external access on your AWS account☆128Feb 27, 2026Updated 2 months ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated 2 months ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 8 months ago
- ☆20Apr 10, 2025Updated last year
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆517Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆37May 13, 2026Updated last week
- Automated web vulnerability scanning with LLM agents☆465Jun 18, 2025Updated 11 months ago
- ☆389Apr 15, 2026Updated last month
- Halberd : Multi-Cloud Agentic Attack Tool☆337Apr 8, 2026Updated last month
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆62Apr 3, 2026Updated last month
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47May 15, 2026Updated last week
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆44May 8, 2026Updated 2 weeks ago