usnistgov / vulntology
Development of the NIST vulnerability data ontology (Vulntology).
☆37Updated 8 months ago
Alternatives and similar repositories for vulntology:
Users that are interested in vulntology are comparing it to the libraries listed below
- OWASP Ontology-driven Threat Modelling framework☆37Updated last year
- NVD API 2.0 for python☆12Updated 4 months ago
- Bugs Framework☆7Updated 3 weeks ago
- A place to systematically store software bill of materials (SBOM) documents.☆44Updated last year
- Security Control Knowledge Graph☆27Updated 9 months ago
- Global Security Database Tools☆42Updated last year
- ☆16Updated 3 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆16Updated 3 years ago
- Posture Attribute Collection and Evaluation☆24Updated last year
- Exploit, Malware and Vulnerability Scoring Application☆10Updated last year
- CVSS v4.0 calculator☆29Updated 5 months ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆60Updated this week
- Tools for security content automation, baseline tailoring, and overlay development.☆43Updated 5 months ago
- ☆14Updated 3 years ago
- CVE.ICU code.☆39Updated this week
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- Implementation of the OSCAL REST API☆19Updated 11 months ago
- A curated threat modeling library collection☆22Updated last year
- Scripts to import OSCAL example content into the Neo4J graph database☆27Updated 2 years ago
- Automatically generated diagrams for OSCAL models☆16Updated 2 years ago
- Exploit Prediction Scoring System (EPSS)☆24Updated 2 years ago
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated 3 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated 10 months ago
- CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.☆17Updated 4 years ago
- A Java library to support processing OSCAL content☆31Updated 7 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆90Updated this week
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated last year
- XML metadata for NIST Technical Series Publications☆24Updated this week
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago