Yuning-J / NVDFeatureAnalysisLinks
Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.
☆13Updated 2 years ago
Alternatives and similar repositories for NVDFeatureAnalysis
Users that are interested in NVDFeatureAnalysis are comparing it to the libraries listed below
Sorting:
- A logic-based enterprise network security analyzer☆137Updated 3 years ago
- ☆86Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆180Updated 2 years ago
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆25Updated 2 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Updated last year
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 3 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Updated last year
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆135Updated 2 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆103Updated 3 months ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆118Updated 4 years ago
- ☆25Updated 4 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆66Updated 10 months ago
- Extracting Attack Behavior from Threat Reports☆81Updated 2 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Updated last year
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆42Updated 9 months ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆206Updated 2 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Updated 3 years ago
- ☆32Updated 5 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66Updated 5 years ago
- The repository of paper "HackMentor: Fine-Tuning Large Language Models for Cybersecurity".☆137Updated last year
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Updated 3 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 4 years ago
- NVD/CVE as JSON files☆124Updated last week
- MALOnt - an ontology for Malware Threat Intelligence.☆13Updated 4 years ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆67Updated 4 years ago
- Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggi…☆14Updated 4 years ago
- Material from the DARPA Transparent Computing Program☆224Updated 5 years ago
- IoT Security Reading List☆62Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 5 years ago
- SPADE: Support for Provenance Auditing in Distributed Environments☆191Updated last month