Software Vulnerabilities to Weakness Mapping
☆24Feb 24, 2022Updated 4 years ago
Alternatives and similar repositories for V2W-BERT
Users that are interested in V2W-BERT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Feb 29, 2024Updated 2 years ago
- ☆16Aug 16, 2023Updated 2 years ago
- ☆14Mar 1, 2023Updated 3 years ago
- ☆22May 10, 2022Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆22Nov 17, 2021Updated 4 years ago
- [ASE2024] Mutual Learning-Based Framework for Enhancing Robustness of Code Models via Adversarial Training☆11Sep 13, 2024Updated last year
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆16Nov 7, 2022Updated 3 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- If you have any questions, please open an issue.☆25Apr 6, 2022Updated 4 years ago
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆42Apr 10, 2024Updated 2 years ago
- Replication of AST Neural Network from Zhang J. et. al (2019) and application to software vulnerability detection☆12Jan 13, 2020Updated 6 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated 2 years ago
- ☆56Nov 19, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆117Apr 7, 2026Updated 3 weeks ago
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- ☆13Oct 31, 2022Updated 3 years ago
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆26May 16, 2023Updated 2 years ago
- The Scott-Knott Effect Size Difference (ESD) test☆44Feb 9, 2023Updated 3 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- A transformer-based VS Code extension that enables one to discover vulnerabilities in Java files.☆12Dec 1, 2022Updated 3 years ago
- ☆13Nov 8, 2022Updated 3 years ago
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 6 months ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆77Jun 24, 2022Updated 3 years ago
- TypeScript/JavaScript client libraries for Sliver☆27Apr 17, 2026Updated 2 weeks ago
- Vision Transformer-Inspired Automated Vulnerability Repair☆19May 13, 2025Updated 11 months ago
- It records your screenshots and code, then lets you upload to ASHIRT☆57Updated this week
- Multi-granularity vulnerability detection with a novel pre-trained code model☆19Dec 15, 2025Updated 4 months ago
- ☆16Nov 20, 2022Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Simple reverse ICMP shell☆14Apr 30, 2024Updated 2 years ago
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆29Apr 2, 2025Updated last year
- ☆20Nov 7, 2025Updated 5 months ago
- Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron appli…☆31Jan 13, 2026Updated 3 months ago
- A static-analysis tool to detect C/C++ vulnerabilities based on graph comparison☆29Feb 26, 2021Updated 5 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- Password and email checker. It is your password or email compromissed? Check it now!☆10Dec 8, 2022Updated 3 years ago