lhmtriet / awesome-vulnerability-assessment
An ever-growing list of resources for data-driven vulnerability assessment and prioritization
☆124Updated 2 years ago
Alternatives and similar repositories for awesome-vulnerability-assessment
Users that are interested in awesome-vulnerability-assessment are comparing it to the libraries listed below
Sorting:
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆92Updated last year
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆245Updated 9 months ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆46Updated 8 months ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆42Updated last month
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆179Updated 2 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆89Updated 9 months ago
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆59Updated 5 months ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆93Updated 10 months ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆204Updated this week
- ☆76Updated 2 years ago
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆88Updated last week
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆38Updated last month
- ☆22Updated 3 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆148Updated 2 years ago
- DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection (RAID 2023) https://surrealyz.github.io/…☆142Updated 6 months ago
- CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques☆20Updated 2 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆62Updated 3 weeks ago
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆40Updated last year
- Extracting Attack Behavior from Threat Reports☆76Updated 2 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- A logic-based enterprise network security analyzer☆125Updated 2 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆75Updated 2 weeks ago
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆52Updated last year
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆29Updated last year
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Updated last year
- malicious PowerShell script detection model☆40Updated 3 years ago
- Malware Bypass Research using Reinforcement Learning☆104Updated last year
- VulDeePecker algorithm implemented in Python☆114Updated 6 years ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 3 years ago
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆133Updated 2 years ago