Cybersecurity-Tools / V2W-BERT
Software Vulnerabilities to Weakness Mapping
☆23Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for V2W-BERT
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆114Updated last year
- DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection (RAID 2023) https://surrealyz.github.io/…☆105Updated last month
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆37Updated 7 months ago
- This repository contains a PyTorch implementation of the paper "Graph Neural Networks for Vulnerability Detection - A Counterfactual Expl…☆25Updated 7 months ago
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆204Updated 3 months ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆83Updated last year
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆44Updated last week
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆242Updated 3 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆14Updated 11 months ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆29Updated last year
- ☆19Updated 3 years ago
- An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tu…☆20Updated 5 months ago
- A deep learning-based vulnerability detection framework☆74Updated 8 months ago
- ATLAS tactics, techniques, and case studies data☆49Updated last month
- CALDERA plugin for adversary emulation of AI-enabled systems☆85Updated last year
- vulnerability detection in python source code with LSTM networks☆118Updated 4 years ago
- A comprehensive local Linux Privilege-Escalation Benchmark☆24Updated 3 weeks ago
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆95Updated 8 months ago
- ☆66Updated last year
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆56Updated 6 months ago
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆16Updated last year
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆41Updated 7 months ago
- ☆22Updated last month
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆11Updated last year
- ☆35Updated 2 years ago
- When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆11Updated 10 months ago
- ☆26Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆138Updated last year
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆13Updated 9 months ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆21Updated 11 months ago