vulsdoc / vuls
☆16Updated 3 weeks ago
Alternatives and similar repositories for vuls:
Users that are interested in vuls are comparing it to the libraries listed below
- VulsRepo is visualized based on the json report output in vuls.☆35Updated 3 years ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆19Updated last week
- Automate the regular transfer of AIS data into a MISP Server☆9Updated 11 months ago
- Easy setup tool for Vuls☆76Updated last month
- ☆23Updated last month
- whois command implemented by golang with awesome whois servers list☆63Updated last year
- Maturity Model Collaborative project☆15Updated 2 years ago
- ☆10Updated 2 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆26Updated 3 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated last year
- A place to systematically store software bill of materials (SBOM) documents.☆46Updated last year
- Vuls Beater for Elasticsearch - connecting vuls☆17Updated 4 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated 2 months ago
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆14Updated last year
- ZAP scripts to implement ASVS L1 checking☆15Updated 3 years ago
- VMC: a Scalable, Open Source and Free Vulnerability Management Platform☆16Updated 4 months ago
- ☆21Updated 2 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- OpenCSPM Community Controls☆14Updated 3 years ago
- DefectDojo Community Content☆18Updated 6 months ago
- ☆11Updated 8 years ago
- ZAP Management Scripts☆23Updated 2 weeks ago
- Docker Security Playground official repository☆1Updated 2 months ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 4 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- OCSP Responder monitor☆34Updated 9 months ago
- A tool to run a command when the target of a symlink changes☆16Updated 9 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated 3 weeks ago