Extract useful semantic from CVE descriptions usinig NLP
☆25Jan 4, 2023Updated 3 years ago
Alternatives and similar repositories for CVE-analyzer
Users that are interested in CVE-analyzer are comparing it to the libraries listed below
Sorting:
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- ☆16Jun 21, 2024Updated last year
- FedBERT : A federated approach that enables clients with limited computing resource to participate without violating data privacy.☆14Jul 3, 2023Updated 2 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Nov 21, 2022Updated 3 years ago
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- A framework for protecting worker location privacy in spatial crowdsourcing☆15Apr 7, 2016Updated 9 years ago
- Browser Fuzzing Framework ,浏览器Fuzzing 框架..☆31Jun 17, 2016Updated 9 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Simple Dockerfile that makes it easy to try OP-TEE using Docker☆23Nov 23, 2023Updated 2 years ago
- A framework for interacting with HCL AppScan on Cloud and HCL AppScan Enterprise☆12Mar 3, 2023Updated 3 years ago
- php Non-AlphaNumeric Encoder☆20Apr 8, 2017Updated 8 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated last year
- thinkphp5 RCE auto exploit☆11Jun 19, 2019Updated 6 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- Apple Differential Privacy Implementation☆16Feb 26, 2021Updated 5 years ago
- Synced with SGX101 gitbook.☆31Dec 7, 2023Updated 2 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆106Nov 9, 2025Updated 4 months ago
- ☆32Jul 1, 2021Updated 4 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- Foreman plug-in for displaying OpenSCAP audit reports☆42Updated this week
- Services and Drivers control application☆19Jul 24, 2017Updated 8 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- ☆15Aug 2, 2014Updated 11 years ago
- A use-after-free checker based on SVF.☆20Nov 29, 2017Updated 8 years ago
- Chrome extension for zero-hour phishing protection☆18Apr 12, 2021Updated 4 years ago
- A better way to write shell code☆11May 28, 2021Updated 4 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- Automatic Identification of Cryptographic Primitives in Software☆32Mar 14, 2015Updated 11 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- Worst Android kernel fuzzer☆45Aug 12, 2020Updated 5 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- 聚合交易平台BitLeague☆11Sep 30, 2018Updated 7 years ago
- ☆29Aug 7, 2025Updated 7 months ago
- An x86-64 instruction decoder.☆16Mar 11, 2024Updated 2 years ago
- HWP Document Fuzzer (Simple OLE Structure Parsing)☆15Dec 30, 2014Updated 11 years ago
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago