This repo contains the data and codes for the paper submitted to ACM TKDD, titled "A Compact Vulnerability Knowledge Graph for Risk Assessment".
☆19Mar 8, 2023Updated 2 years ago
Alternatives and similar repositories for VulKG
Users that are interested in VulKG are comparing it to the libraries listed below
Sorting:
- ☆14Dec 8, 2022Updated 3 years ago
- Vulnerability knowledge graph construction☆30Dec 24, 2022Updated 3 years ago
- The SEPSES Cyber-KB Engine☆27Nov 27, 2024Updated last year
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- Arch Linux dotfiles☆10Oct 31, 2024Updated last year
- ☆11Nov 25, 2020Updated 5 years ago
- Script for downloading Burp Suite extension files☆11Jan 29, 2024Updated 2 years ago
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Feb 18, 2026Updated 2 weeks ago
- ☆11Jan 23, 2021Updated 5 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- ☆15Feb 21, 2023Updated 3 years ago
- Bangla Text Augmentation☆11Aug 30, 2023Updated 2 years ago
- Repair docker-smell automatically☆13May 15, 2024Updated last year
- Tools for Quickly Formatting and Partitioning USB Flash Drives☆11Apr 13, 2016Updated 9 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- Converts JSON data to HTML table with collapsible details view for nested objects.☆14May 1, 2021Updated 4 years ago
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- Adaptive Machine Learning-Based Stock Prediction using Financial Time Series Technical Indicators☆10Dec 21, 2019Updated 6 years ago
- Simplify and speed up common tasks in your ORT-based FOSS review workflows☆13Dec 19, 2025Updated 2 months ago
- Create CycloneDX Software Bill of Materials (SBOM) for Buildroot projects☆13Dec 9, 2025Updated 2 months ago
- ☆10Sep 14, 2020Updated 5 years ago
- Docker configuration for running Pi-Hole and Cloudflared on a Raspberry Pi for ultimate network DNS filtering and security☆11Jul 17, 2021Updated 4 years ago
- Translate Braille Writing to Plain Text☆10Nov 6, 2025Updated 3 months ago
- Slackbot for Quivr 🧠☆15Feb 17, 2026Updated 2 weeks ago
- hackasat-qualifier-2023-techpapers☆11Jul 17, 2023Updated 2 years ago
- ☆12Jan 16, 2023Updated 3 years ago
- Cookiecutter template for building consistent Terraform modules.☆12Nov 5, 2015Updated 10 years ago
- ☆12Mar 23, 2024Updated last year
- ☆12Aug 21, 2020Updated 5 years ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- ☆11Nov 21, 2020Updated 5 years ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- This stack will synchronize Postgresql database with Elasticsearch using Logstash☆12Sep 1, 2019Updated 6 years ago
- SWORD: A Whole Program Race Detector for Java☆13Jan 30, 2021Updated 5 years ago
- Course Materials for the introductory class of the UWPCE Python Certificate program☆15Feb 20, 2024Updated 2 years ago
- Source for my personal website☆12Feb 9, 2026Updated 3 weeks ago