This is a dataset intended to train a LLM model for a completely CVE focused input and output.
☆66Jun 22, 2025Updated 10 months ago
Alternatives and similar repositories for CVE-llm_dataset
Users that are interested in CVE-llm_dataset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ChatCVE is an app using the Langchain SQL Language Tool to give a LLM prompt experience to CVE and SBOM DevSecOps Triage Data☆22Dec 14, 2025Updated 4 months ago
- Uses python3.10, Debian, python-Nmap, OpenaAI, and flask framework to create a Nmap API that can do scans with a good speed online and is…☆80Jan 22, 2025Updated last year
- Convert PHP code into PHP opcode, use GaussianNB for training☆10Mar 21, 2020Updated 6 years ago
- hacking framework complete source-code for web, wifi, url, sql-injection and doing a complete web scan for starters.☆30Dec 8, 2022Updated 3 years ago
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆19Jul 19, 2024Updated last year
- Neo4j Cybersecurity Demo☆19Mar 16, 2022Updated 4 years ago
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆592Nov 9, 2024Updated last year
- The fuzzing framework named SHADOWFUZZER to find clientside vulnerabilities when processing incoming MQTT messages.☆20May 10, 2023Updated 2 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 3 years ago
- ☆32Sep 3, 2024Updated last year
- The C4 Concurrent C Fuzzer☆14Nov 2, 2023Updated 2 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated last month
- Decrypt TLS traffic from a pcap file☆28May 4, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An overview of LLMs for cybersecurity.☆1,304Apr 16, 2026Updated 3 weeks ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆37Dec 5, 2022Updated 3 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection (RAID 2023) https://surrealyz.github.io/…☆179Oct 23, 2024Updated last year
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- IotSan: Fortifying the Safety of IoT Systems (ACM CoNEXT'18)☆14Jan 30, 2019Updated 7 years ago
- [IEEE T-IFS] AutoPT: How Far Are We from the Fully Automated Web Penetration Testing?☆36Mar 28, 2026Updated last month
- [ICCV 2021] Multimodal Knowledge Expansion☆10Aug 28, 2021Updated 4 years ago
- Linux Auditing System logs pretty printer☆11Dec 22, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 3 years ago
- ☆15Dec 22, 2015Updated 10 years ago
- CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques☆21Aug 24, 2022Updated 3 years ago
- A tree-sitter-grammar for cairo 1.0☆16Dec 14, 2022Updated 3 years ago
- A Simulated Optimal Intrusion Response Game☆21Apr 3, 2022Updated 4 years ago
- IoT CVEs as abnormal events to evaluate a real-time host-based IDS. https://doi.org/10.1016/j.future.2022.03.001☆14Mar 16, 2022Updated 4 years ago
- ☆10May 8, 2024Updated last year
- ☆10Feb 10, 2020Updated 6 years ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆31Apr 21, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆327Jul 30, 2024Updated last year
- Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.☆11Aug 14, 2024Updated last year
- ☆10Jul 9, 2020Updated 5 years ago
- ☆10Feb 6, 2018Updated 8 years ago
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Apr 30, 2026Updated last week
- FuzzBuilderEx is a system to build seed corpus and fuzzing executables using the test framework automatically.☆14Sep 6, 2022Updated 3 years ago
- Awesome-Backdoor-on-LMMs is a collection of state-of-the-art, novel, exciting backdoor methods on LMMs (VLPs, TDMs, VLMs, and Agents).☆26Apr 17, 2026Updated 2 weeks ago