Yuning-J / VulnerabilityClassifierLinks
Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.
☆25Updated 2 years ago
Alternatives and similar repositories for VulnerabilityClassifier
Users that are interested in VulnerabilityClassifier are comparing it to the libraries listed below
Sorting:
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Updated last year
- a Machine Learning powered CSRF attacks finding tool☆26Updated 6 years ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆140Updated this week
- Static Token And Credential Scanner☆95Updated 2 years ago
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆196Updated last year
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆20Updated last year
- NVD/CVE as JSON files☆124Updated this week
- Testability Pattern Catalogs for SAST☆31Updated 11 months ago
- ☆44Updated 3 years ago
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆20Updated 3 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Updated 6 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆66Updated 10 months ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated 2 years ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆42Updated 9 months ago
- A Python3 module to assist in fuzzing web applications☆57Updated 2 years ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆134Updated 2 years ago
- AutoSpear☆72Updated 2 years ago
- A Scrapy-based crawler for crawling Exploit Database☆12Updated 7 years ago
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Updated 7 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆37Updated 2 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆54Updated 5 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Updated 6 years ago
- JAW: A Graph-based Security Analysis Framework for Client-side JavaScript☆117Updated 4 months ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Updated 2 years ago
- 📕NVD Database☆116Updated this week
- Tools for conducting analysis of CVE data in Elasticsearch☆73Updated 6 months ago
- Compiled dataset of Java deserialization CVEs☆60Updated 5 years ago
- ☆44Updated 4 years ago
- ☆19Updated 10 years ago