Yuning-J / VulnerabilityClassifier
Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.
☆23Updated last year
Alternatives and similar repositories for VulnerabilityClassifier
Users that are interested in VulnerabilityClassifier are comparing it to the libraries listed below
Sorting:
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Updated last year
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 10 months ago
- AutoSpear☆61Updated last year
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆42Updated last month
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆38Updated last month
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆18Updated 9 months ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Updated 5 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆55Updated 4 years ago
- ☆43Updated 2 years ago
- A Scrapy-based crawler for crawling Exploit Database☆12Updated 6 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆54Updated last year
- Perform CVE lookup on cvedetails.com☆24Updated last year
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆15Updated 2 years ago
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Updated 4 years ago
- CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)☆22Updated 4 years ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆131Updated this week
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆124Updated 2 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- Grammar-based HTTP/2 fuzzer with mutation ability☆43Updated 2 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆41Updated 2 months ago
- Artifact for ICSE 2023☆49Updated 2 years ago
- Dataset used in WAF-A-MoLE paper☆8Updated 4 years ago
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated last year
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆116Updated 3 years ago
- ☆13Updated 4 years ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆35Updated last year
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆20Updated 3 years ago