Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
-
Updated
Nov 21, 2024
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threat information, gain a competitive advantage, and stay informed about the latest trends.
Build a CVE library with aggregated CISA, EPSS and CVSS data
Scraper for daily renewal of the Known Exploited Vulnerabilities Catalog by CISA
Be notified whenever CISA updates their Known Exploited Vulnerabilities Catalog
A single JSON file with all CERT-FR ALE entries and their CVE data
Check CVSS v3.1 and EPSS scores for a given CVE ID and whether its in CISA KEV catalog
batCAVE Security Data Lake daily reporting automation
Add a description, image, and links to the cisa-kev topic page so that developers can more easily learn about it.
To associate your repository with the cisa-kev topic, visit your repo's landing page and select "manage topics."