whitehatboy005 / JSON2YAML-CVELinks
JSON2YAML is a Python-based utility that simplifies the process of converting CVE (Common Vulnerabilities and Exposures) data from JSON format into well-structured YAML files. This tool allows security analysts and developers to easily manage, analyze, and integrate CVE data into their vulnerability management systems.
☆11Updated 8 months ago
Alternatives and similar repositories for JSON2YAML-CVE
Users that are interested in JSON2YAML-CVE are comparing it to the libraries listed below
Sorting:
- File Password Cracker is a versatile tool designed to help users crack password-protected files. The tool supports a wide range of file f…☆12Updated 8 months ago
- This Python application provides a graphical user interface (GUI) for downloading YouTube videos or audio using the YT-DLP library. Users…☆10Updated 8 months ago
- This Python application creates a chatbot interface using Streamlit, allowing users to interact with an AI model powered by the google.ge…☆10Updated 7 months ago
- ☆10Updated last year
- ☆10Updated last year
- ☆10Updated last year
- ☆10Updated last year
- This Python application provides a graphical user interface (GUI) for fetching and displaying details about a YouTube video using the YT…☆11Updated 8 months ago
- This Python application allows you to convert images into pencil sketches using the OpenCV library. It features a simple graphical user i…☆11Updated 8 months ago
- This project is a Blockchain-based Voting System application built using Python and Tkinter. It uses blockchain technology to ensure the …☆11Updated 8 months ago
- ☆78Updated last month
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆13Updated last month
- An insane list of all dorks taken from everywhere from various different sources.☆710Updated 11 months ago
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆34Updated last year
- A quick bug bounty guide for beginners☆85Updated 5 months ago
- Make your Kali Repository Run Faster using Bash Script☆14Updated 10 months ago
- ☆469Updated last week
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆230Updated 4 months ago
- recon for bug hunters☆806Updated 3 weeks ago
- Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, …☆59Updated 2 years ago
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,380Updated last month
- Here you can find mostly all disclosed h1 reports☆27Updated 3 years ago
- ☆13Updated 7 months ago
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆17Updated 2 years ago
- An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionab…☆85Updated 8 months ago
- A complete, beginner-friendly bug bounty roadmap that takes you from zero experience to earning your first bounty.☆415Updated last month
- Here Are Some Popular Hacking PDF☆521Updated last month
- ☆217Updated last week
- Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.☆684Updated this week
- ☆142Updated 8 months ago