Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds
-
Updated
May 29, 2024
Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds
The Common Vulnerabilities Exposures (CVE) Database
High-risk CVEs that may require verification and impact analysis.
CERT/CC's fork of Metasploit Framework in which we are tagging commits that include vulnerability IDs. The first commit for an ID we recognize gets the tag for that ID. Aside from adding git tags, we do not otherwise modify the code. Updates hourly.
A free and open vulnerabilities database and the packages they impact. And the tools to aggregate and correlate these vulnerabilities. Sponsored by NLnet https://nlnet.nl/project/vulnerabilitydatabase/ for https://www.aboutcode.org/ Chat at https://gitter.im/aboutcode-org/vulnerablecode Docs at https://vulnerablecode.readthedocs.org/
CERT/CC's fork of the official Exploit Database repository in which we are tagging commits that include vulnerability IDs. The first commit for an ID we recognize gets the tag for that ID. Aside from adding git tags, we do not otherwise modify the code. Updates hourly.
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordinated vulnerability disclosure. VINCE is a Python-based web platform.
Nmap script that scans for probable vulnerabilities based on services discovered in open ports.
PatrowlHears - Vulnerability Intelligence Center / Exploits
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
This article aims to demystify SQL Injection, explaining what it is, how it operates, its purposes in the cybersecurity landscape, and mentioning tools that can be used to conduct such attacks.
Yet Another Web Security Scanner | A Web Application Security Scanner Written in Python.
A collection of resources related to vulnerability management.
Advanced vulnerability scanning with Nmap NSE
Grunt plugin for retire.
A CVRF CSAF Converter, taking care about OASIS specification.
Add a description, image, and links to the vulnerability-identification topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability-identification topic, visit your repo's landing page and select "manage topics."