VulnCheck's official command line tool
☆152Mar 5, 2026Updated 2 weeks ago
Alternatives and similar repositories for cli
Users that are interested in cli are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The VulnCheck Github Action☆14Feb 25, 2026Updated 3 weeks ago
- Automate vulnerability triage which prioritizes remediation over discovery☆20Updated this week
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆42Jan 9, 2023Updated 3 years ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- ☆20Jul 16, 2025Updated 8 months ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆25Mar 9, 2026Updated 2 weeks ago
- A collection of packages for using GitHub security advisories in Node.js.☆18Updated this week
- A Go-based Exploit Framework☆415Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83May 3, 2024Updated last year
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 3 years ago
- Code and Website For PatchThis.app☆32Updated this week
- ☆38Dec 29, 2024Updated last year
- ☆10May 12, 2022Updated 3 years ago
- NVD API 2.0 client for CVE information☆13May 15, 2025Updated 10 months ago
- A repo to conduct vulnerability enrichment.☆742Updated this week
- ☆16Updated this week
- Fork Threat Modeling Platform - Community☆27Oct 10, 2025Updated 5 months ago
- Generate VEX (Vulnerability Exploitability Exchange) CycloneDX documents☆23Jan 19, 2025Updated last year
- A mirror of ISM OSCAL documents. The authoritative source can be found at https://www.cyber.gov.au/ism/oscal.☆57Dec 9, 2025Updated 3 months ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 10 months ago
- A repo for output of an intrusion prediction project☆11Mar 15, 2026Updated last week
- ☆15Aug 16, 2024Updated last year
- Because I can't find scripts to do this anywhere else...☆26Dec 27, 2016Updated 9 years ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆29Dec 1, 2023Updated 2 years ago
- A go-exploit to scan for implanted Cisco IOS XE Systems☆41Oct 28, 2024Updated last year
- Application Security Mind Maps☆11Apr 10, 2021Updated 4 years ago
- A Rust crate for dealing with the actual Policy files themselves☆12Oct 26, 2025Updated 4 months ago
- Sechead is a powerful security tool developed in Python that allows users to audit the security headers of any website. With Sechead, use…☆13May 22, 2023Updated 2 years ago
- Stakeholder-Specific Vulnerability Categorization☆176Updated this week
- K8s API Honeypot with Active Defense Capabilities☆44Jan 7, 2024Updated 2 years ago
- Type-safe slack client for TypeScript.☆15Dec 19, 2018Updated 7 years ago
- A CLI Tool to find resources in an AWS Account not actively managed by Cloudformation!☆11Aug 27, 2021Updated 4 years ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆33Updated this week
- Repository for on-going work as part of the SBOM for AI Tiger Team effort.☆42Jul 28, 2025Updated 7 months ago
- A tool to create, transform and attest VEX metadata☆178Updated this week
- Network Cryptography Monitor - using eBPF, written in python☆42Aug 26, 2025Updated 6 months ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆11Aug 15, 2024Updated last year
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 3 months ago