Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds
-
Updated
Jul 3, 2024
Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds
Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list
DetectiveAttacks aims to simplify the process of mitigating cyber attacks directed toward digital infrastructure.
Visualization of CWE tree structure & navigation between weaknesses
CVE-ICU is a research project that automatically pulls all CVE data from the NVD and performs fundamental data analysis and graphing.
"Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyber Hunting" by Erik Hemberg, Jonathan Kelly, Michal Shlapentokh-Rothman, Bryn Reinstadler, Katherine Xu, Nick Rutar, Una-May O'Reilly
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
The SpotBugs plugin for security audits of Java web applications and Android applications. (Also work with Kotlin, Groovy and Scala projects)
CISA Known Exploited Vulnerabilities Catalog Enrichment
A Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC
The CWE Calculator enables software development teams to score and prioritize discovered weaknesses empirically based on data in the National Vulnerability Database (NVD).
cwe_checker finds vulnerable patterns in binary executables
Corax for Java: A general static analysis framework for java code checking.
Vulnogram is a tool for creating and editing CVE information in CVE JSON format
This repository contains information related to the Root Cause Mapping Working Group and its activities. CVE Numbering Authority (CNA) representatives are invited to join and contribute to the working group's efforts.
Development of the NIST vulnerability data ontology (Vulntology).
Essential Guide to the OWASP Top 10; Key Vulnerabilities for Educational and Learning Purposes.
Add a description, image, and links to the cwe topic page so that developers can more easily learn about it.
To associate your repository with the cwe topic, visit your repo's landing page and select "manage topics."