Cybersecurity-Tools / V2W-BERTLinks
Software Vulnerabilities to Weakness Mapping
☆23Updated 3 years ago
Alternatives and similar repositories for V2W-BERT
Users that are interested in V2W-BERT are comparing it to the libraries listed below
Sorting:
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆135Updated 2 years ago
- ☆81Updated 3 months ago
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆18Updated 2 years ago
- Bundle of security analysis scripts for keras tensorflow models☆15Updated last year
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆312Updated last year
- ATLAS tactics, techniques, and case studies data☆99Updated last week
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆37Updated 2 years ago
- ☆27Updated 2 years ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆109Updated 2 years ago
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆43Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Updated last year
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆103Updated 3 months ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Updated last year
- A dataset of software supply chain compromises. Please help us maintain it!☆129Updated 3 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆66Updated 10 months ago
- DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection (RAID 2023) https://surrealyz.github.io/…☆173Updated last year
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆42Updated 9 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆84Updated last year
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆301Updated this week
- This repository offers a detailed taxonomy of existing AI-driven security solutions tailored for DevSecOps, highlighting the current rese…☆17Updated 7 months ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆66Updated 2 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Updated 2 years ago
- MoreFixes: A Large-Scale Dataset of CVE Fix Commits Mined through Enhanced Repository Discovery☆63Updated last month
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆25Updated 2 years ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆103Updated 2 years ago
- This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited…☆91Updated 3 weeks ago
- ☆32Updated last month
- ☆16Updated 4 years ago
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆66Updated 7 months ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated this week