An ever-growing list of resources for data-driven vulnerability assessment and prioritization
☆136Mar 1, 2023Updated 3 years ago
Alternatives and similar repositories for awesome-vulnerability-assessment
Users that are interested in awesome-vulnerability-assessment are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆20Feb 25, 2023Updated 3 years ago
- This is the replication package of V-SZZ, which has been accepted by ICSE2022☆16Jan 19, 2026Updated 2 months ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆71Mar 25, 2025Updated last year
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆30Dec 1, 2023Updated 2 years ago
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆25May 16, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- Stakeholder-Specific Vulnerability Categorization☆177Updated this week
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆49Aug 9, 2023Updated 2 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆63Feb 23, 2024Updated 2 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆43Apr 10, 2024Updated last year
- A transformer-based VS Code extension that enables one to discover vulnerabilities in Java files.☆12Dec 1, 2022Updated 3 years ago
- Vulnerability knowledge graph construction☆30Dec 24, 2022Updated 3 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83May 3, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs - DIMVA '24☆16Aug 20, 2024Updated last year
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆321Jul 30, 2024Updated last year
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆357Mar 25, 2021Updated 5 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆48Oct 9, 2023Updated 2 years ago
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- Python bindings for libsrcml☆17Aug 25, 2025Updated 7 months ago
- A deep learning-based vulnerability detection framework☆76Feb 29, 2024Updated 2 years ago
- ☆226Jul 25, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆24Dec 10, 2022Updated 3 years ago
- ☆117Apr 3, 2024Updated last year
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- Artifact repository for the paper "A Large-scale Data Set and an Empirical Study of Docker Images Hosted on Docker Hub." This reproducibl…☆13Oct 9, 2020Updated 5 years ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Sep 2, 2021Updated 4 years ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆37May 13, 2024Updated last year
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- VulnerabilityDetectionResearch☆94Mar 22, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Home page of project "KB"☆134Mar 27, 2025Updated last year
- Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs,…☆20Mar 21, 2026Updated last week
- ☆23Nov 10, 2023Updated 2 years ago
- Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction☆10May 10, 2021Updated 4 years ago
- This project provides several implementations for commit untangling and proposes a new representation of git patches by projecting the pa…☆12Jul 28, 2025Updated 8 months ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆16Nov 7, 2022Updated 3 years ago
- ⚔️MITRE ATT&CK Machinations in R☆23Aug 11, 2020Updated 5 years ago