-
Updated
Apr 6, 2022 - Python
#
cve-scanning
Here are 48 public repositories matching this topic...
cve-search - a tool to perform local searches for known vulnerabilities
vulnerabilities
cve
cpe
vulnerability-detection
cve-scanning
vulnerability-assessment
common-vulnerabilities
cve-search
cve-databases
cve-entries
LunaSec - Open Source AppSec platform that automatically notifies you the next time vulnerabilities like Log4Shell or node-ipc happen. Track your dependencies and builds in a centralized service. Get started in one-click via our GitHub App or host it yourself. https://github.com/apps/lunatrace-by-lunasec/
security
dependency-analysis
cybersecurity
pci-dss
web-security
compliance
hardening
scanning
cve-scanning
tokenization
gdpr
security-tools
devsecops
zero-trust
soc2
privacy-by-design
sbom
scanning-tool
sbom-generator
log4shell
-
Updated
Apr 7, 2022 - TypeScript
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
ruby
rails
security
security-audit
network
scanner
hacking
nmap
cve
network-analysis
vulnerability-detection
cve-scanning
hacking-tool
vulnerability-scanners
vulnerability-assessment
security-tools
-
Updated
Mar 30, 2022 - Ruby
Finding potential software vulnerabilities from git commit messages
-
Updated
Feb 2, 2022 - Python
Open Source Security Guide
security
awesome
best-practices
owasp
penetration-testing
awesome-list
pentesting
compliance
vulnerabilities
security-hardening
appsec
vulnerability-detection
cve-scanning
vulnerability-scanners
gdpr
security-automation
security-tools
devsecops
pentesting-tools
-
Updated
Apr 7, 2022 - Go
National Vulnerability Database dependency checker for Clojure projects
-
Updated
Apr 6, 2022 - Clojure
SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.
rss
exploit
management
cybersecurity
vulnerability
vulnerabilities
cve
cve-scanning
cyber-security
cve-search
-
Updated
Mar 29, 2022 - CSS
A simple framework for sending test payloads for known web CVEs.
-
Updated
Dec 16, 2020 - Python
Check linux sources dump for known CVEs.
-
Updated
Apr 4, 2022 - SmPL
Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds
-
Updated
Apr 8, 2022
python
security
security-audit
dependency-analysis
owasp
cli-utility
vulnerability-detection
software-supply-chain
cve-scanning
software-composition-analysis
-
Updated
Jun 22, 2021 - Python
An experimental tool that scans dependencies in your Gradle project and warns you about potential security issues
-
Updated
Jan 2, 2022 - Python
A compilation of resources in the software supply chain security domain, with emphasis on open source
static-analysis
security-vulnerability
dependencies
vulnerability-management
software-supply-chain
cve-scanning
attestation
package-management
reproducible-builds
devsecops
software-composition-analysis
vulnerability-scanning
dependency-management
oss-compliance
sbom
supply-chain-security
supply-chain-attacks
software-supply-chain-security
-
Updated
Mar 19, 2022
The Land of The Broken Minds
-
Updated
Sep 1, 2021 - Python
System Security Checker is a bundle of small shell scripts to assess your computer security.
-
Updated
Aug 31, 2019 - Shell
Scan products in your stack for known vulnerabilities
-
Updated
Apr 20, 2021 - Python
Guide to auditing EVM smart contracts using tools
-
Updated
Jun 1, 2021 - Makefile
CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.
python
nist
scan
bom
nvd3
vulnerability
vulnerabilities
cve
vulnerability-detection
cve-scanning
vulnerability-identification
vulnerability-scanners
vulnerability-scanning
vulnerability-scanner
cve-search
cve-databases
sbom
cve-entries
-
Updated
Oct 26, 2020 - Python
Vulnerability management tool that provides Yocto SBOM generation and CVE Analysis of target images.
security-vulnerability
cve
cve-scanning
linux-security
yocto-linux-security
yocto-security
vigiles-cve-scanner
yocto-cve-analysis
yocto-sbom
spdx-sbom
-
Updated
Feb 10, 2022 - Python
Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)
api
cli
security
dependencies
cve
mitre
cve-scanning
security-scanner
security-tools
cve-search
mitre-attack
mitre-api
-
Updated
Jul 29, 2020 - Python
JitterBug passively searches for Basic Info, open ports, potential CVE's on the given Target IP in third party databases without Direct interaction with the target
dialog
cve-scanning
information-gathering
portscanner
passive-vulnerability-scanner
vulnerability-scanning
vulnerability-scanner
ip-info
passive-check
cve-search
osint-tool
passive-info
jitterbug
-
Updated
Sep 29, 2021 - Shell
Olger, authomated cybersecurity analyst , check infrastructures and deploy solutions
graphviz
pdf
ansible
elasticsearch
kibana
haproxy
cybersecurity
nmap
cve
d3js
dot-files
haproxy-configuration
cve-scanning
d3-graph
visualizes-data
-
Updated
Aug 21, 2021 - Python
CVE-2020-14179 Scanner
-
Updated
Jan 18, 2021 - Perl
security
exploit
vulnerability
vulnerabilities
cve
exploitation
vulnerability-management
cve-scanning
vulnerability-scanners
-
Updated
Sep 2, 2020 - Shell
L4r1k
commented
Nov 6, 2017
Work has started on implementing the frontend UI but it needs to be finished. The user should be able to input an IP address and choose from a dropdown of a list of scan types to run. This should post to the scan action which in turn will interface with the db
An Advanced tool to scan hundreds of IP's in Seconds for CVE's, Open Ports And Web Technologies.
-
Updated
Mar 6, 2022 - Shell
Docker image to provide a report of PHP Security alerts, from a composer.lock file.
-
Updated
Feb 11, 2019 - Dockerfile
Improve this page
Add a description, image, and links to the cve-scanning topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the cve-scanning topic, visit your repo's landing page and select "manage topics."


It would be very handy for us if we could target specific package versions in the --module-ignore flag so that we don't have to come back and manually update our whitelists once we update problematic package versions. For example: