usnistgov / vulntologyView external linksLinks
Development of the NIST vulnerability data ontology (Vulntology).
☆43Nov 10, 2025Updated 3 months ago
Alternatives and similar repositories for vulntology
Users that are interested in vulntology are comparing it to the libraries listed below
Sorting:
- JSON schema representation of Stucco ontology☆19Apr 14, 2016Updated 9 years ago
- Software Supply Chain Attribute Integrity (SCAI) Demos and CLI tools☆19Feb 6, 2026Updated last week
- TRADES Tool☆18Jan 1, 2025Updated last year
- A list of tools for publishing and consuming Linked Data.☆23Mar 7, 2017Updated 8 years ago
- ☆13Nov 18, 2025Updated 2 months ago
- The unified ICAS ontology designed to describe information-security related information☆28Feb 6, 2024Updated 2 years ago
- A GeoDjango app to return Cascadia quake risk and resilience factors based on location☆12Updated this week
- Verifiable Credential Server for Web5.☆11Dec 17, 2022Updated 3 years ago
- ☆11Aug 17, 2023Updated 2 years ago
- GitHub Actions Security Tester☆12Feb 1, 2023Updated 3 years ago
- ☆10Dec 19, 2017Updated 8 years ago
- ☆17Sep 14, 2022Updated 3 years ago
- Github Artifacts server example☆12Jun 4, 2021Updated 4 years ago
- Source Code Transparency☆11Sep 25, 2023Updated 2 years ago
- CVSS v4.0 calculator☆39Aug 19, 2024Updated last year
- MulVAL is an cybersecurity reasoning engine that can be applied on top of multiple contexts (cloud, IoT, enterprise network, etc )☆11Feb 23, 2016Updated 9 years ago
- ☆11Nov 20, 2024Updated last year
- The cryptographic signature multifomat☆13Jul 9, 2025Updated 7 months ago
- Java tools and libraries providing a Metaschema toolchain☆15Oct 27, 2025Updated 3 months ago
- Transform SBOM contents into a formatted document including markdown and PDF formats☆38Jan 26, 2026Updated 3 weeks ago
- A Java library to support processing OSCAL content☆36Dec 17, 2025Updated 2 months ago
- A SPARQL to Cypher query transpiler that converts a given SPARQL query to an equivalent Cypher query.☆13Aug 25, 2021Updated 4 years ago
- GitHub Actions based repository scanning workflows with a primary goal of evaluating C & C++ repositories for risks.☆16Oct 8, 2024Updated last year
- Report on quality of SBOM contents☆25Dec 18, 2024Updated last year
- ☆26Aug 31, 2023Updated 2 years ago
- Generate VEX (Vulnerability Exploitability Exchange) CycloneDX documents☆23Jan 19, 2025Updated last year
- Extract relationships between cyber security entities within unstructured text☆24Sep 28, 2018Updated 7 years ago
- Central document repository for CVE service design☆20Mar 19, 2024Updated last year
- ☆22May 11, 2022Updated 3 years ago
- Python tools for using OpenID's Shared Signals Framework (including CAEP)☆23Mar 7, 2025Updated 11 months ago
- A CLI tool for creating secure by design/default source repos.☆28Jul 29, 2024Updated last year
- ☆24Feb 3, 2026Updated 2 weeks ago
- Binary encoding data format which ensures lexicographic sort order☆35Dec 14, 2025Updated 2 months ago
- My entire hacker toolkit ready for to run on a vanilla Arch Linux installation.☆26Apr 10, 2023Updated 2 years ago
- Layer to integrate the ACRN hypervisor with the Yocto Project.☆26Aug 6, 2025Updated 6 months ago
- CVE Automation Working Group☆181Updated this week
- Verifiable Credentials for Supply Chain Interoperability Specification for HTTP☆29Apr 5, 2025Updated 10 months ago
- ☆40Updated this week
- ☆75Dec 10, 2025Updated 2 months ago