whitehatboy005 / JSON2YAML-CVELinks
JSON2YAML is a Python-based utility that simplifies the process of converting CVE (Common Vulnerabilities and Exposures) data from JSON format into well-structured YAML files. This tool allows security analysts and developers to easily manage, analyze, and integrate CVE data into their vulnerability management systems.
☆11Updated 11 months ago
Alternatives and similar repositories for JSON2YAML-CVE
Users that are interested in JSON2YAML-CVE are comparing it to the libraries listed below
Sorting:
- This Python application provides a graphical user interface (GUI) for downloading YouTube videos or audio using the YT-DLP library. Users…☆10Updated 11 months ago
- File Password Cracker is a versatile tool designed to help users crack password-protected files. The tool supports a wide range of file f…☆12Updated 11 months ago
- This Python application creates a chatbot interface using Streamlit, allowing users to interact with an AI model powered by the google.ge…☆10Updated 11 months ago
- ☆10Updated last year
- ☆10Updated last year
- ☆10Updated last year
- ☆10Updated last year
- This Python application allows you to convert images into pencil sketches using the OpenCV library. It features a simple graphical user i…☆11Updated 11 months ago
- This project is a Blockchain-based Voting System application built using Python and Tkinter. It uses blockchain technology to ensure the …☆11Updated 11 months ago
- ☆91Updated last month
- A quick bug bounty guide for beginners☆89Updated 9 months ago
- Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, …☆68Updated 2 years ago
- ☆27Updated 2 months ago
- ☆544Updated this week
- Penetration Testing Learning Guide☆129Updated 8 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆365Updated 8 months ago
- An insane list of all dorks taken from everywhere from various different sources.☆769Updated last month
- recon for bug hunters☆860Updated 2 months ago
- ☆163Updated 11 months ago
- Curated list of 20,000+ hours and 200+ free courses with certificates in IT, CS, Design and Business.☆20Updated 3 months ago
- A complete, beginner-friendly bug bounty roadmap that takes you from zero experience to earning your first bounty.☆941Updated 5 months ago
- To use hackJS, specify a target URL that contains JavaScript files you want to analyze. The tool will fetch these JavaScript files, extra…☆20Updated 7 months ago
- ☆23Updated last year
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆13Updated 4 months ago
- Make your Kali Repository Run Faster using Bash Script☆14Updated last year
- ☆150Updated last year
- ☆227Updated 2 weeks ago
- Customize Your Terminal with Powerlevel10k and Zsh for an Enhanced Experience☆16Updated last year
- A powerful asynchronous XSS scanner supporting up to 1,500 concurrent requests.☆164Updated last year
- ☆23Updated last month