This repo contains the data and codes for the paper submitted to ACM TKDD, titled "A Compact Vulnerability Knowledge Graph for Risk Assessment".
☆19Mar 8, 2023Updated 3 years ago
Alternatives and similar repositories for VulKG
Users that are interested in VulKG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE\CWE\CAPEC\ATT&CK, security knowledge graph, knowledge graph completion☆14Jun 9, 2023Updated 2 years ago
- ☆14Dec 8, 2022Updated 3 years ago
- Vulnerability knowledge graph construction☆30Dec 24, 2022Updated 3 years ago
- ☆70Dec 8, 2025Updated 4 months ago
- ☆12Jan 16, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆11Jan 23, 2021Updated 5 years ago
- Representation Learning with Ordered Relation Paths for Knowledge Graph Completion (EMNLP 2019)☆11Nov 17, 2019Updated 6 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- ☆12Oct 5, 2022Updated 3 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆67May 12, 2020Updated 5 years ago
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- Repository for accompanying materials to Threat Knowledge Graphs.☆21Jul 16, 2025Updated 9 months ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- Corpus of auto-labeled text for the cyber security domain☆97Nov 27, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Tkinter Console Widget Class☆11Dec 25, 2017Updated 8 years ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- ☆16Dec 28, 2016Updated 9 years ago
- ☆11Nov 21, 2020Updated 5 years ago
- Tool for learning linear temporal logic formulas using combinatorial approach☆13Jan 11, 2025Updated last year
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- [JJIT2018] Official repository for "Braille to Text Translation for Bengali Language: A Geometric Approach"☆10Nov 6, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Security Control Knowledge Graph☆32Apr 24, 2024Updated 2 years ago
- Blizzard CTF 2017: Sombra True Random Number Generator (STRNG).☆18May 20, 2018Updated 7 years ago
- ☆44Apr 29, 2020Updated 6 years ago
- ☆11Sep 14, 2020Updated 5 years ago
- CleanVul: Automatic Function-Level Vulnerability Detection in Code Commits Using LLM Heuristics☆22Mar 25, 2026Updated last month
- Our team's CTF writeups☆11Jan 15, 2020Updated 6 years ago
- The source code of Disconnected Emerging Knowledge Graph Oriented Inductive Link Prediction☆10May 6, 2022Updated 3 years ago
- 基于Python爬虫的CNNVD漏洞信息监控脚本——Cnnvd_monitor,实现了对CNNVD官网平台的实时监控、数据获取、入库、并用微信进行实时推送、并将获取的数据进行Web端表格展示。☆15Aug 9, 2021Updated 4 years ago
- old school bbs system, with a bell 202 style modem frontend☆12May 18, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Microservice Boilerplate for Golang with gRPC and RESTful API. Multiple database and client supported☆15Jul 4, 2021Updated 4 years ago
- Bangla Text Augmentation☆11Aug 30, 2023Updated 2 years ago
- Log-based anomaly detection☆14Jul 2, 2025Updated 10 months ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆118Jun 21, 2021Updated 4 years ago
- exploit vulnerable c/c++ programms with buffer overflow attacks☆24Jul 18, 2022Updated 3 years ago
- This stack will synchronize Postgresql database with Elasticsearch using Logstash☆12Sep 1, 2019Updated 6 years ago
- R-GCN知识图谱推理☆32Dec 3, 2024Updated last year