usnistgov / BF
Bugs Framework
☆7Updated 3 weeks ago
Alternatives and similar repositories for BF:
Users that are interested in BF are comparing it to the libraries listed below
- NVD API 2.0 for python☆12Updated 4 months ago
- ☆14Updated 3 years ago
- ☆16Updated 3 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Development of the NIST vulnerability data ontology (Vulntology).☆37Updated 8 months ago
- Fedramp.gov source code for site built on https://federalist.18f.gov/☆5Updated this week
- Automated Static Analysis Framework☆9Updated 2 years ago
- Exploit, Malware and Vulnerability Scoring Application☆10Updated last year
- Develop Enhancements, Future Implementations and New Education☆12Updated last year
- XML metadata for NIST Technical Series Publications☆24Updated this week
- ☆15Updated 6 years ago
- Training scenarios for cyber ranges☆11Updated 4 years ago
- Automate the regular transfer of AIS data into a MISP Server☆7Updated 8 months ago
- OSCAL reusable component definitions library☆11Updated 9 months ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated 9 months ago
- ☆15Updated 3 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- Official repository for the Open Vulnerability and Assessment Language☆40Updated last week
- A tool for detecting sensitive data in code repositories☆14Updated 2 months ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated last year
- A curated list of Cloud Security techniques and tools☆30Updated last year
- This repository supports the blog site www.cloudauditcontrols.com.☆9Updated last week
- Open YARA scan- and search engine☆20Updated last month
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Updated 4 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- A Java library to support processing OSCAL content☆31Updated 7 months ago
- OWASP Foundation Web Respository☆10Updated last year
- ☆11Updated 4 years ago