usnistgov / vulntology
Development of the NIST vulnerability data ontology (Vulntology).
☆37Updated 9 months ago
Alternatives and similar repositories for vulntology:
Users that are interested in vulntology are comparing it to the libraries listed below
- OWASP Ontology-driven Threat Modelling framework☆37Updated last year
- Security Control Knowledge Graph☆27Updated 10 months ago
- Global Security Database Tools☆43Updated last year
- Posture Attribute Collection and Evaluation☆24Updated last year
- Exploit Prediction Scoring System (EPSS)☆24Updated 2 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- A place to systematically store software bill of materials (SBOM) documents.☆44Updated last year
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆63Updated last month
- CVSS v4.0 calculator☆29Updated 6 months ago
- Adversary Emulation Planner☆38Updated 8 months ago
- Stakeholder-Specific Vulnerability Categorization☆139Updated this week
- ☆19Updated 4 years ago
- OWASP Foundation Web Respository☆29Updated 2 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated 10 months ago
- Tools for security content automation, baseline tailoring, and overlay development.☆43Updated 6 months ago
- ☆47Updated this week
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆49Updated this week
- Bugs Framework☆7Updated this week
- Static Token And Credential Scanner☆96Updated last year
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆27Updated 10 months ago
- NVD API 2.0 for python☆12Updated 5 months ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 8 months ago
- XML metadata for NIST Technical Series Publications☆25Updated this week
- Kestrel Jupyter Notebook Kernel☆9Updated last year
- CVE.ICU code.☆39Updated this week
- Exploit, Malware and Vulnerability Scoring Application☆11Updated last year
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated 4 months ago
- Examples and proof-of-concept for Software Bill of Materials (SBOM) code & data☆57Updated 11 months ago
- A Python library and command line interface for CVE Services.☆62Updated last week
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆91Updated last month