Yuning-J / VulnerabilityClassifierLinks
Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.
☆24Updated 2 years ago
Alternatives and similar repositories for VulnerabilityClassifier
Users that are interested in VulnerabilityClassifier are comparing it to the libraries listed below
Sorting:
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆51Updated 3 months ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated last year
- ☆43Updated 2 years ago
- AutoSpear☆62Updated last year
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Updated last year
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆134Updated this week
- CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)☆22Updated 4 years ago
- A variant analysis and visualisation tool that scans codebases for similar vulnerabilities☆73Updated 3 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Updated 5 years ago
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Updated 4 years ago
- Dataset used in WAF-A-MoLE paper☆8Updated 5 years ago
- This repository contains a curated list of awesome resources related to AISecOps.☆14Updated 3 years ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆18Updated 11 months ago
- ☆13Updated 4 years ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆40Updated 2 months ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆117Updated 4 years ago
- Testability Pattern Catalogs for SAST☆31Updated 4 months ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆125Updated 2 years ago
- Perform CVE lookup on cvedetails.com☆24Updated last year
- IoT and Operational Technology Honeypot☆103Updated last year
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆16Updated 2 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- Interactive, dynamic, and realistic LLM honeypots☆52Updated 4 months ago
- Artifact for ICSE 2023☆49Updated 2 years ago
- 利用预训练语言模型从非结构化威胁报告中提取 MITRE ATT&CK TTP 信息☆73Updated last year
- A Python3 module to assist in fuzzing web applications☆57Updated last year
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- Static Token And Credential Scanner☆96Updated 2 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆42Updated 11 months ago