Yuning-J / NVDFeatureAnalysis
Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for NVDFeatureAnalysis
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆20Updated last year
- A logic-based enterprise network security analyzer☆110Updated last year
- ☆19Updated 3 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆137Updated last year
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆11Updated 3 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆33Updated 4 months ago
- ☆73Updated last year
- malicious PowerShell script detection model☆36Updated 3 years ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆82Updated last year
- Extracting Attack Behavior from Threat Reports☆75Updated last year
- ☆14Updated 3 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆110Updated 3 years ago
- Material from the DARPA Transparent Computing Program☆180Updated 4 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆30Updated last year
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆71Updated 4 months ago
- ☆30Updated 3 years ago
- A protocol reverse engineering tool for industrial binary protocol based on pin tool☆16Updated 4 years ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆113Updated last year
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆60Updated this week
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆35Updated 2 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆36Updated 2 months ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆22Updated 5 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆158Updated last year
- This repository contains scripts and dataset for a Apt Identification Triage System☆14Updated 5 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆57Updated 4 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- BAG-MulVAL: Auxiliary analyzer of intranet security☆21Updated last year
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆31Updated 6 months ago
- A deep learning-based vulnerability detection framework☆74Updated 8 months ago
- ☆30Updated 4 months ago