A comprehensive collection of tools and resources for vulnerability management, CVSS scoring, and security analysis. Built for security professionals, researchers, and students preparing for vulnerability management assessments.
This repository contains:
- CVE Aggregator: Automated tool to fetch and analyze recent CVEs from NVD
- CVSS Calculator: Interactive web-based calculator for CVSS v3.1 scoring
- Educational Guides: Comprehensive documentation on CVE, CVSS, CWE, and OWASP
- Practice Materials: Real-world case studies and assessment preparation resources
Automatically fetch and generate reports of recent vulnerabilities from the National Vulnerability Database.
# Install dependencies
pip install -r cve-aggregator/requirements.txt
# Run the aggregator
python cve-aggregator/main.pyConfiguration (config.json):
{
"api_url": "https://services.nvd.nist.gov/rest/json/cves/2.0",
"days_back": 7, // Look back 7 days
"min_cvss": 7.0, // Minimum severity threshold
"output_dir": "output" // Report destination
}Output: Generates markdown reports in output/ directory with:
- CVE summaries sorted by severity
- CVSS scores and vectors
- CWE classifications
- Reference links
Browser-based calculator for computing CVSS v3.1 scores with real-time feedback.
# Open in browser
open cvss-calculator/index.htmlFeatures:
- Interactive metric selection (Attack Vector, Complexity, etc.)
- Real-time score calculation
- Vector string generation and parsing
- Copy/export functionality
- No server required - runs entirely client-side
Complete reference covering:
- CVE: Unique vulnerability identifiers and lifecycle
- CVSS: Scoring system with base, temporal, and environmental metrics
- CWE: Weakness classification and pattern recognition
- OWASP: Top 10 web application security risks
Use Case: Study material for vulnerability management Level 2 assessments
Deep dive into:
- Confidentiality: Protecting data from unauthorized access
- Integrity: Ensuring data accuracy and preventing tampering
- Availability: Maintaining system uptime and accessibility
- Likelihood Assessment: Risk calculation methodologies
- Proof of Concept: Analyzing exploit code and attack feasibility
Use Case: Understanding security fundamentals and risk assessment
.
βββ cve-aggregator/
β βββ main.py # Core CVE fetching logic
β βββ config.json # Configuration parameters
β βββ requirements.txt # Python dependencies
β βββ output/ # Generated reports
β
βββ cvss-calculator/
β βββ index.html # Standalone CVSS calculator
β
βββ cve-readme.md # Comprehensive study guide
βββ poc-standard-triad.md # CIA Triad deep dive
βββ README.md # This file
- Daily Monitoring: Aggregate critical CVEs affecting your stack
- Patch Prioritization: Use CVSS scores to prioritize remediation
- Threat Intelligence: Track exploit availability and severity trends
- Vulnerability Analysis: Study recent CVEs and attack patterns
- Risk Assessment: Calculate environmental CVSS scores for your context
- Pattern Recognition: Identify recurring CWE weaknesses in products
- Exam Preparation: Study guides for vulnerability management certifications
- Hands-on Practice: Interactive calculator for CVSS scoring exercises
- Case Studies: Real-world examples of security incidents and responses
- β Automated NVD API integration
- β Configurable severity filtering
- β Markdown report generation
- β Date range customization
- β Error handling and rate limiting
- β Full CVSS v3.1 implementation
- β Real-time score calculation
- β Vector string parsing
- β Export and copy functionality
- β Mobile-responsive design
- β 250+ pages of technical content
- β Real-world case studies
- β Practice questions
- β Quick reference cards
- β Step-by-step walkthroughs
Language: Python 3.8+
Dependencies: requests
API: NVD REST API v2.0
Output Format: Markdown
Key Functions:
fetch_cves(): Retrieves vulnerabilities from NVDparse_cves(): Filters and structures CVE datagenerate_markdown(): Creates formatted reportssave_report(): Writes output with timestamps
Stack: React 18 + Tailwind CSS
Mode: Client-side only (no backend)
Algorithm: CVSS v3.1 specification
Format: Single HTML file (portable)
Calculation Engine:
- Base score computation
- Impact subscore calculation
- Exploitability subscore calculation
- Severity rating classification
# CVE Intelligence Report
**Generated:** 2025-11-18 08:52:40
**Period:** Last 7 days
**Minimum CVSS:** 7.0
**Total CVEs Found:** 307
## Summary
- π΄ Critical (β₯9.0): 41
- π High (7.0-8.9): 266
## Detailed CVE List
### 1. CVE-2025-42890 - π΄ CRITICAL
**CVSS Score:** 10.0
**Vector:** CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
**CWE:** CWE-798
**Description:** Hardcoded credentials in SQL Anywhere...Base Score: 9.8 CRITICAL
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: CRITICAL
Priority: Emergency (24-48 hours)
This project is licensed under the MIT License - see MIT License for details.
Contributions welcome! Feel free to:
- Report bugs or issues
- Suggest new features
- Submit pull requests
- Improve documentation
For questions or feedback, open an issue on GitHub.
Last Updated: November 2025
Maintained by: Security Bay