whitehatboy005 / JSON2YAML-CVELinks
JSON2YAML is a Python-based utility that simplifies the process of converting CVE (Common Vulnerabilities and Exposures) data from JSON format into well-structured YAML files. This tool allows security analysts and developers to easily manage, analyze, and integrate CVE data into their vulnerability management systems.
☆11Updated 8 months ago
Alternatives and similar repositories for JSON2YAML-CVE
Users that are interested in JSON2YAML-CVE are comparing it to the libraries listed below
Sorting:
- This Python application provides a graphical user interface (GUI) for downloading YouTube videos or audio using the YT-DLP library. Users…☆10Updated 8 months ago
- ☆10Updated last year
- ☆10Updated last year
- File Password Cracker is a versatile tool designed to help users crack password-protected files. The tool supports a wide range of file f…☆12Updated 8 months ago
- This Python application creates a chatbot interface using Streamlit, allowing users to interact with an AI model powered by the google.ge…☆10Updated 8 months ago
- ☆10Updated last year
- ☆10Updated last year
- This Python application allows you to convert images into pencil sketches using the OpenCV library. It features a simple graphical user i…☆11Updated 8 months ago
- This project is a Blockchain-based Voting System application built using Python and Tkinter. It uses blockchain technology to ensure the …☆11Updated 8 months ago
- ☆82Updated last month
- A quick bug bounty guide for beginners☆86Updated 6 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆239Updated 5 months ago
- ☆26Updated last month
- ☆490Updated 3 weeks ago
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆13Updated last month
- ☆10Updated 2 years ago
- ☆150Updated 8 months ago
- Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, …☆61Updated 2 years ago
- An insane list of all dorks taken from everywhere from various different sources.☆715Updated last year
- ☆12Updated 3 years ago
- ☆217Updated last month
- A complete, beginner-friendly bug bounty roadmap that takes you from zero experience to earning your first bounty.☆472Updated 2 months ago
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆35Updated last year
- ☆46Updated last year
- recon for bug hunters☆827Updated last week
- ☆139Updated 9 months ago
- ☆429Updated 2 months ago
- ☆12Updated 3 years ago
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,414Updated 2 months ago
- Here Are Some Popular Hacking PDF☆523Updated last week