Vulnerability knowledge graph construction
☆30Dec 24, 2022Updated 3 years ago
Alternatives and similar repositories for VulKG
Users that are interested in VulKG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE\CWE\CAPEC\ATT&CK, security knowledge graph, knowledge graph completion☆14Jun 9, 2023Updated 2 years ago
- This repo contains the data and codes for the paper submitted to ACM TKDD, titled "A Compact Vulnerability Knowledge Graph for Risk Asses…☆19Mar 8, 2023Updated 3 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆37Dec 5, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques☆21Aug 24, 2022Updated 3 years ago
- The SEPSES Cyber-KB Engine☆28Nov 27, 2024Updated last year
- Knowledge graph extraction from text using OpenAI ChatGPT for graph extraction and Neo4j for DB storage☆11Feb 26, 2024Updated 2 years ago
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- AIM MCP Server :: Guard and Protect your MCPs & AI Chatting☆20Oct 13, 2025Updated 6 months ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 3 years ago
- ☆19Jan 2, 2025Updated last year
- ☆17Mar 27, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- ☆89Jan 4, 2023Updated 3 years ago
- Code for the paper "Knowledge Base Completion for Constructing Problem-Oriented Medical Records" at MLHC 2020☆11Jun 8, 2021Updated 4 years ago
- Data samples for Observability and SIEM☆16Apr 24, 2026Updated last week
- Master UI for ROBOKOP☆15Mar 31, 2023Updated 3 years ago
- Though language model text embeddings have revolutionized NLP research, their ability to capture high-level semantic information, such as…☆28Apr 28, 2023Updated 3 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- ☆19Sep 7, 2025Updated 7 months ago
- Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)☆17Aug 20, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ORION is a tool that ingests datasets from diverse knowledge bases and transforms them into modular, interoperable knowledge graphs.☆17Apr 29, 2026Updated last week
- Benchmarking suite for the Web-Scale Data Management course using Locust☆14Aug 9, 2024Updated last year
- ☆27Feb 19, 2024Updated 2 years ago
- Knowledge Representation and Knowledge Modeling Based on Knowledge Graph Questions and Answers☆19Jun 19, 2019Updated 6 years ago
- ☆13Oct 14, 2025Updated 6 months ago
- [NeurIPS'24, Spotlight] CTIBench: A Benchmark for Evaluating LLMs in Cyber Threat Intelligence☆83Feb 11, 2026Updated 2 months ago
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 6 years ago
- ☆17May 5, 2022Updated 4 years ago
- A static analysis tool for Java programs, based on the theory of code property graphs.☆20Mar 27, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This project is to implement the algorithm discussed in Efficient Identification of Overlapping Communities.☆15Nov 8, 2021Updated 4 years ago
- ☆18Jul 20, 2023Updated 2 years ago
- OpenAI Gym environment for graph search problems such as shortest path.☆11Dec 24, 2019Updated 6 years ago
- BNNetSimulator is a packet-level network simulator to generate datasets for research and analysis.☆18Feb 8, 2024Updated 2 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆28Apr 12, 2024Updated 2 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Knowledge Graph Construction From Text☆27Feb 5, 2018Updated 8 years ago