Enriching the NVD CVSS scores to include Temporal & Threat Metrics
☆222Apr 8, 2026Updated this week
Alternatives and similar repositories for cvss-bt
Users that are interested in cvss-bt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆84May 3, 2024Updated last year
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆699Jan 6, 2026Updated 3 months ago
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆23Mar 27, 2026Updated 2 weeks ago
- A repo to conduct vulnerability enrichment.☆750Updated this week
- Stakeholder-Specific Vulnerability Categorization☆177Updated this week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Kaze's openly available CVE vulnerability data.☆16Apr 7, 2025Updated last year
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14Updated this week
- Open source templates you can use to bootstrap your security programs☆899Dec 28, 2025Updated 3 months ago
- MultiStep MCP That Returns CVE Information With EPSS Score☆13May 22, 2025Updated 10 months ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆88Aug 13, 2025Updated 8 months ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆726Nov 14, 2025Updated 4 months ago
- Repository for CoSAI Workstream 1, Software Supply Chain Security for AI Systems☆44Mar 11, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆20Jul 16, 2025Updated 8 months ago
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆127Apr 1, 2026Updated last week
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Apr 1, 2026Updated last week
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆178Mar 1, 2026Updated last month
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆46Oct 1, 2025Updated 6 months ago
- Source for official CVE Program policy documents.☆18Jan 28, 2026Updated 2 months ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Apr 5, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆92Updated this week
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated last month
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 7 months ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last month
- ☆20Apr 10, 2025Updated last year
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆494Updated this week
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- ☆382Apr 18, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Automated web vulnerability scanning with LLM agents☆459Jun 18, 2025Updated 9 months ago
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆36Updated this week
- Halberd : Multi-Cloud Agentic Attack Tool☆335Updated this week
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆62Apr 3, 2026Updated last week
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated 2 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Apr 3, 2026Updated last week
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago