VulnCheck's official command line tool
☆152Apr 6, 2026Updated last week
Alternatives and similar repositories for cli
Users that are interested in cli are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automate vulnerability triage which prioritizes remediation over discovery☆20Updated this week
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆42Jan 9, 2023Updated 3 years ago
- Customized NXLog configuration used to generate data from Windows endpoints that can be leveraged by teams for better insight into host-a…☆17Jul 22, 2021Updated 4 years ago
- Remotely collect linux live forensics artifacts.☆14Jul 8, 2022Updated 3 years ago
- A collection of packages for using GitHub security advisories in Node.js.☆18Apr 6, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆84May 3, 2024Updated last year
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 3 years ago
- Library to ingest and generate VEX documents☆20Mar 9, 2026Updated last month
- Code and Website For PatchThis.app☆32Updated this week
- overlay filesystem userspace utilities, include fsck.overlay which is used to check and optionally repair underlying directories of overl…☆15Jun 8, 2021Updated 4 years ago
- Damn Vulnerable SCA Application☆43Mar 30, 2026Updated 2 weeks ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Ruby library for accessing the certificate store on Windows☆11Mar 16, 2026Updated 3 weeks ago
- NVD API 2.0 client for CVE information☆13May 15, 2025Updated 10 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A repo to conduct vulnerability enrichment.☆750Updated this week
- ☆16Updated this week
- Fork Threat Modeling Platform - Community☆28Oct 10, 2025Updated 6 months ago
- Generate VEX (Vulnerability Exploitability Exchange) CycloneDX documents☆23Jan 19, 2025Updated last year
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 11 months ago
- CLI tool to validate CVE v5 JSON records.☆13May 14, 2025Updated 10 months ago
- Because I can't find scripts to do this anywhere else...☆26Dec 27, 2016Updated 9 years ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆30Dec 1, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A Sal client for Chrome OS☆16Jan 3, 2025Updated last year
- CVE.ICU code.☆51Updated this week
- Application Security Mind Maps☆11Apr 10, 2021Updated 5 years ago
- Playbooks for automation of ApisCP platforms☆17Jun 2, 2019Updated 6 years ago
- Stakeholder-Specific Vulnerability Categorization☆177Apr 6, 2026Updated last week
- K8s API Honeypot with Active Defense Capabilities☆44Jan 7, 2024Updated 2 years ago
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Mar 31, 2026Updated last week
- Type-safe slack client for TypeScript.☆15Dec 19, 2018Updated 7 years ago
- Repository for on-going work as part of the SBOM for AI Tiger Team effort.☆43Jul 28, 2025Updated 8 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A tool to create, transform and attest VEX metadata☆182Updated this week
- Threat Response API Module☆10Oct 4, 2023Updated 2 years ago
- My blog☆12Sep 9, 2025Updated 7 months ago
- ☆39Jul 1, 2025Updated 9 months ago
- Piper Burp Suite Extender plugin☆16Jan 15, 2026Updated 2 months ago
- A scanner of the "World's Scariest" scanner☆17Dec 7, 2022Updated 3 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated 11 months ago