Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.
☆26May 16, 2023Updated 3 years ago
Alternatives and similar repositories for VulnerabilityClassifier
Users that are interested in VulnerabilityClassifier are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆21Feb 25, 2023Updated 3 years ago
- Using Dash Cytoscape to visualise networks from a packet capture☆11Jun 22, 2022Updated 3 years ago
- dga classification with fasttext☆12Oct 29, 2018Updated 7 years ago
- PoC for CVE-2021-43557☆22Nov 22, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- CyberX-AI-Digital-Twin is an AI-powered cybersecurity platform that uses digital twin technology to simulate, detect, and analyze cyber t…☆14Feb 13, 2025Updated last year
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆138Mar 1, 2023Updated 3 years ago
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14May 15, 2026Updated last week
- ☆16Aug 5, 2020Updated 5 years ago
- ☆31Aug 21, 2022Updated 3 years ago
- automatic data race analysis for Linux device drivers☆12Jul 27, 2016Updated 9 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- A collection of resources related to vulnerability management.☆15Aug 8, 2023Updated 2 years ago
- [ICSE 2023] Differentiable interpretation and failure-inducing input generation for neural network numerical bugs.☆13Jan 5, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Matlab code: "Wong, C. M., et al. (2020). Inter-and intra-subject transfer reduces calibration effort for high-speed SSVEP-based BCIs. IE…☆11Apr 27, 2023Updated 3 years ago
- Express API documentation generator☆10Jul 19, 2019Updated 6 years ago
- ☆26Jan 15, 2021Updated 5 years ago
- Gait Phase Estimation using Artificial Intelligence☆11Feb 23, 2022Updated 4 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆30Aug 16, 2021Updated 4 years ago
- Gradle script plugin which formats test output in a slightly colorful way (made for Travis CI but works in terminal)☆16Jan 12, 2018Updated 8 years ago
- A word2vec model trained over Vulners☆16Jan 3, 2022Updated 4 years ago
- MD5 in VHDL☆11Jan 4, 2017Updated 9 years ago
- TFA project for indirect call analysis☆13Mar 13, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The newest version of PatchNet☆14Nov 25, 2022Updated 3 years ago
- A Computational Graph Generator for AI Compiler Fuzzing☆16May 31, 2023Updated 2 years ago
- CVE-2022-21907 Vulnerability PoC☆29Jan 23, 2022Updated 4 years ago
- 1000个PHP代码审计案例(2016.7以前乌云公开漏洞)☆11Sep 30, 2016Updated 9 years ago
- BurpCrypto officially confirms the supported JS library (BurpCrypto官方确认支 持的JS库).☆12Sep 21, 2021Updated 4 years ago
- Library for preprocessing java source code into Augmented ASTs, as per the paper Open Vocabulary Learning on Source Code with a Graph-Str…☆21Oct 22, 2018Updated 7 years ago
- Software Vulnerabilities to Weakness Mapping☆24Feb 24, 2022Updated 4 years ago
- a data collection of related work: Toward Understanding Deep Learning Framework Bugs☆18Oct 23, 2023Updated 2 years ago
- Automated PoC of CVE-2021-44521☆10Feb 24, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 4 years ago
- ☆22Dec 9, 2023Updated 2 years ago
- 红方人员作战执行手册☆11Feb 22, 2020Updated 6 years ago
- ☆11Nov 1, 2023Updated 2 years ago
- ☆16May 28, 2024Updated last year
- 灵芝IAST是一款交互式应用安全评估工具,覆盖了Java WEB相关安全风险的检测,具有近实时检测、准确率高、误报率低、漏洞链路清晰等特点|使用之前请阅读官方文档☆16Jul 18, 2020Updated 5 years ago
- An implementation of a Model Context Protocol (MCP) for the Nuclei scanner. This tool enables context-aware vulnerability scanning by int…☆47Aug 4, 2025Updated 9 months ago